{"id":"https://openalex.org/W3104930162","doi":"https://doi.org/10.1145/3368089.3417041","title":"Inferring and securing software configurations using automated reasoning","display_name":"Inferring and securing software configurations using automated reasoning","publication_year":2020,"publication_date":"2020-11-07","ids":{"openalex":"https://openalex.org/W3104930162","doi":"https://doi.org/10.1145/3368089.3417041","mag":"3104930162"},"language":"en","primary_location":{"id":"doi:10.1145/3368089.3417041","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3368089.3417041","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3368089.3417041","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3368089.3417041","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016175378","display_name":"Paul Gazzillo","orcid":"https://orcid.org/0000-0003-1425-8873"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Paul Gazzillo","raw_affiliation_strings":["University of Central Florida, USA"],"affiliations":[{"raw_affiliation_string":"University of Central Florida, USA","institution_ids":["https://openalex.org/I106165777"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5016175378"],"corresponding_institution_ids":["https://openalex.org/I106165777"],"apc_list":null,"apc_paid":null,"fwci":0.6077,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.71794872,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1517","last_page":"1520"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8271401524543762},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.700206995010376},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5563687086105347},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.5562180876731873},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4443441331386566},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.4385630488395691},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4316997826099396},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.41949978470802307},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3897762894630432},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24801695346832275},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2202492654323578},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.09454256296157837}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8271401524543762},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.700206995010376},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5563687086105347},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.5562180876731873},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4443441331386566},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.4385630488395691},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4316997826099396},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.41949978470802307},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3897762894630432},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24801695346832275},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2202492654323578},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.09454256296157837},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3368089.3417041","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3368089.3417041","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3368089.3417041","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3368089.3417041","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3368089.3417041","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3368089.3417041","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3104930162.pdf","grobid_xml":"https://content.openalex.org/works/W3104930162.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W2013108033","https://openalex.org/W2113201637","https://openalex.org/W2151725765","https://openalex.org/W2170167679","https://openalex.org/W2171570823","https://openalex.org/W2294668324","https://openalex.org/W2407999381","https://openalex.org/W2521776546","https://openalex.org/W2732872135","https://openalex.org/W2741376011","https://openalex.org/W2892370116","https://openalex.org/W2962943581","https://openalex.org/W2968504444","https://openalex.org/W4312961284"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4306406268","https://openalex.org/W2886678613","https://openalex.org/W2537809616","https://openalex.org/W2347476215","https://openalex.org/W4224306440"],"abstract_inverted_index":{"Software":[0],"configurability":[1],"opens":[2],"the":[3,17,25,37,74,80,107],"door":[4],"to":[5,43,94,105,117],"misconfiguration":[6,34],"vulnerabilities,":[7],"invalid":[8],"settings":[9],"that":[10],"expose":[11],"software":[12,47,71],"weaknesses.":[13],"Misconfiguration":[14],"is":[15],"one":[16],"top":[18],"ten":[19],"most":[20,26],"critical":[21],"security":[22],"risks":[23],"and":[24,45,88,109,114],"common.":[27],"This":[28],"paper":[29],"envisions":[30],"a":[31,96],"world":[32],"without":[33],"vulnerabilities":[35],"through":[36],"use":[38,102],"of":[39,57,76,99,111],"automated":[40],"reasoning":[41],"techniques":[42],"infer":[44],"secure":[46,58,119],"configurations.":[48],"Real-world":[49,65],"software,":[50],"however,":[51],"often":[52],"lacks":[53],"an":[54],"explicit":[55],"specification":[56],"configurations,":[59,113],"relying":[60],"on":[61],"hand-validation":[62],"by":[63],"users.":[64],"systems":[66],"comprise":[67],"many":[68],"individual":[69],"highly-configurable":[70],"components,":[72],"making":[73],"space":[75],"possible":[77],"configurations":[78],"for":[79],"whole":[81],"system":[82],"enormous.":[83],"To":[84],"realize":[85],"our":[86],"vision":[87],"overcome":[89],"these":[90],"challenges,":[91],"we":[92],"aim":[93],"create":[95],"rigorous":[97],"definition":[98],"configuration":[100],"specifications,":[101],"formal":[103],"methods":[104],"mechanize":[106],"inference":[108],"generation":[110],"valid":[112],"develop":[115],"algorithms":[116],"automatically":[118],"against":[120],"misconfiguration.":[121]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
