{"id":"https://openalex.org/W2766183686","doi":"https://doi.org/10.1145/3140549.3140559","title":"WebMTD","display_name":"WebMTD","publication_year":2017,"publication_date":"2017-10-30","ids":{"openalex":"https://openalex.org/W2766183686","doi":"https://doi.org/10.1145/3140549.3140559","mag":"2766183686"},"language":"en","primary_location":{"id":"doi:10.1145/3140549.3140559","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3140549.3140559","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 Workshop on Moving Target Defense","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011198056","display_name":"Amirreza Niakanlahiji","orcid":"https://orcid.org/0000-0002-7282-1575"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Amirreza Niakanlahiji","raw_affiliation_strings":["University of North Carolina, Charlotte, Charlotte, NC, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of North Carolina, Charlotte, Charlotte, NC, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023197641","display_name":"Jafar Haadi Jafarian","orcid":"https://orcid.org/0000-0001-8115-085X"},"institutions":[{"id":"https://openalex.org/I921990950","display_name":"University of Colorado Denver","ror":"https://ror.org/02hh7en24","country_code":"US","type":"education","lineage":["https://openalex.org/I921990950"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jafar Haadi Jafarian","raw_affiliation_strings":["University of Colorado Denver, Denver, CO, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Colorado Denver, Denver, CO, USA","institution_ids":["https://openalex.org/I921990950"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011198056"],"corresponding_institution_ids":["https://openalex.org/I102149020"],"apc_list":null,"apc_paid":null,"fwci":5.0623,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.95884527,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"17","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cross-site-scripting","display_name":"Cross-site scripting","score":0.8730001449584961},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7987909317016602},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.6382310390472412},{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.6012524366378784},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.5995359420776367},{"id":"https://openalex.org/keywords/client-side-scripting","display_name":"Client-side scripting","score":0.5259585380554199},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.48036107420921326},{"id":"https://openalex.org/keywords/web-server","display_name":"Web server","score":0.4639306664466858},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.44895660877227783},{"id":"https://openalex.org/keywords/backward-compatibility","display_name":"Backward compatibility","score":0.4430367350578308},{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.44024670124053955},{"id":"https://openalex.org/keywords/web-application-development","display_name":"Web application development","score":0.43709924817085266},{"id":"https://openalex.org/keywords/web-api","display_name":"Web API","score":0.42039069533348083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4118824899196625},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.4093005657196045},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.35418760776519775},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3526495099067688},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.27192676067352295},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12698739767074585}],"concepts":[{"id":"https://openalex.org/C39569185","wikidata":"https://www.wikidata.org/wiki/Q371199","display_name":"Cross-site scripting","level":5,"score":0.8730001449584961},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7987909317016602},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.6382310390472412},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.6012524366378784},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.5995359420776367},{"id":"https://openalex.org/C195274430","wikidata":"https://www.wikidata.org/wiki/Q1650567","display_name":"Client-side scripting","level":5,"score":0.5259585380554199},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.48036107420921326},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.4639306664466858},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.44895660877227783},{"id":"https://openalex.org/C20574231","wikidata":"https://www.wikidata.org/wiki/Q844605","display_name":"Backward compatibility","level":2,"score":0.4430367350578308},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.44024670124053955},{"id":"https://openalex.org/C120927855","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application development","level":4,"score":0.43709924817085266},{"id":"https://openalex.org/C127613066","wikidata":"https://www.wikidata.org/wiki/Q557770","display_name":"Web API","level":4,"score":0.42039069533348083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4118824899196625},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.4093005657196045},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.35418760776519775},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3526495099067688},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.27192676067352295},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12698739767074585},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3140549.3140559","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3140549.3140559","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 Workshop on Moving Target Defense","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W143177508","https://openalex.org/W200873936","https://openalex.org/W1516074370","https://openalex.org/W1561387739","https://openalex.org/W1612694023","https://openalex.org/W1877037860","https://openalex.org/W1948712562","https://openalex.org/W1974977720","https://openalex.org/W2046312985","https://openalex.org/W2085925880","https://openalex.org/W2101699859","https://openalex.org/W2103262407","https://openalex.org/W2168563136","https://openalex.org/W2169476734","https://openalex.org/W2197836422","https://openalex.org/W2256200255","https://openalex.org/W2494110282","https://openalex.org/W2625788084","https://openalex.org/W2795070701"],"related_works":["https://openalex.org/W1222699389","https://openalex.org/W4250914548","https://openalex.org/W4250289522","https://openalex.org/W2480890606","https://openalex.org/W4244258610","https://openalex.org/W2185493255","https://openalex.org/W2256200255","https://openalex.org/W4220760914","https://openalex.org/W641981999","https://openalex.org/W2766183686"],"abstract_inverted_index":{"Existing":[0],"mitigation":[1],"techniques":[2,68],"for":[3,234],"Web":[4,22,25,31,45,127,149,159,166,186,236,243],"code":[5,49,123,134,138,172,176,191,237],"injection":[6,124,139,238],"attacks":[7,73,125,239],"have":[8],"not":[9,100],"been":[10],"widely":[11],"adopted,":[12],"primarily":[13],"due":[14,215],"to":[15,42,53,71,147,168,216],"incurring":[16],"impractical":[17],"overheads":[18],"on":[19,39,126,154,240],"the":[20,170,174],"developer,":[21],"applications,":[23,46,128],"or":[24,51],"browsers.":[26,152],"They":[27],"either":[28],"substantially":[29],"increase":[30],"server/client":[32],"execution":[33],"time,":[34],"enforce":[35],"restrictive":[36],"coding":[37],"practices":[38],"developers,":[40,148],"fail":[41,52],"support":[43],"legacy":[44],"demand":[47],"browser":[48,55,190],"modification,":[50],"provide":[54],"backward":[56],"compatibility.":[57],"Moving":[58],"Target":[59],"Defense":[60],"(MTD)":[61],"is":[62,84,99,145,182],"a":[63,96,111,119,142],"novel":[64],"proactive":[65,112],"class":[66,121],"of":[67,92,122,157,165],"that":[69,98,117,144,198,208,226],"aim":[70],"defeat":[72],"by":[74,86,103],"imposing":[75],"uncertainty":[76,83],"in":[77,95,141],"attack":[78],"reconnaissance":[79],"and":[80,88,136,151,177,189,221],"planning.":[81],"This":[82],"achieved":[85],"frequent":[87],"random":[89],"mutation":[90],"(randomization)":[91],"system":[93],"configuration":[94],"manner":[97,143],"traceable":[101],"(predictable)":[102],"attackers.":[104],"In":[105],"this":[106,181],"paper,":[107],"we":[108,196,206],"present":[109],"WebMTD,":[110],"moving":[113],"target":[114],"defense":[115],"mechanism":[116],"thwarts":[118],"broad":[120,218],"including":[129],"cross-site":[130],"scripting":[131],"(XSS),":[132],"HTML":[133],"injection,":[135],"server-side":[137],"attacks,":[140],"transparent":[146],"applications":[150],"Relying":[153],"built-in":[155],"features":[156],"modern":[158],"browsers,":[160],"WebMTD":[161,199,230],"randomizes":[162],"certain":[163],"attributes":[164],"elements":[167],"differentiate":[169],"application":[171],"from":[173],"injected":[175],"disallow":[178],"its":[179,217],"execution;":[180],"done":[183],"without":[184],"requiring":[185],"developer":[187],"involvement":[188],"modification.":[192],"Through":[193],"rigorous":[194],"evaluation,":[195],"show":[197],"has":[200],"very":[201],"low":[202,222],"performance":[203],"overhead.":[204,223],"Also,":[205],"argue":[207],"our":[209],"technique":[210,233],"outperforms":[211],"all":[212],"competing":[213],"approaches":[214],"effectiveness,":[219],"transparency,":[220],"We":[224],"claim":[225],"these":[227],"qualities":[228],"make":[229],"an":[231],"ideal":[232],"defeating":[235],"real-world":[241],"production":[242],"applications.":[244]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":5}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2017-11-10T00:00:00"}
