{"id":"https://openalex.org/W4307533935","doi":"https://doi.org/10.1145/3548606.3559381","title":"Cerberus","display_name":"Cerberus","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4307533935","doi":"https://doi.org/10.1145/3548606.3559381"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3559381","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3559381","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559381","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559381","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054818695","display_name":"Tamjid Al Rahat","orcid":"https://orcid.org/0000-0002-2599-3825"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tamjid Al Rahat","raw_affiliation_strings":["University of California, Los Angeles, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Los Angeles, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I161318765"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101567136","display_name":"Yu Feng","orcid":"https://orcid.org/0000-0003-1000-1229"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yu Feng","raw_affiliation_strings":["University of California, Santa Barbara, Santa Barbara, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Santa Barbara, Santa Barbara, CA, USA","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100716458","display_name":"Yuan Tian","orcid":"https://orcid.org/0000-0002-6435-564X"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuan Tian","raw_affiliation_strings":["University of California, Los Angeles, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Los Angeles, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I161318765"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054818695"],"corresponding_institution_ids":["https://openalex.org/I161318765"],"apc_list":null,"apc_paid":null,"fwci":1.7585,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.87558988,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"2459","last_page":"2473"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.749013364315033},{"id":"https://openalex.org/keywords/codebase","display_name":"Codebase","score":0.7480430603027344},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5320397615432739},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5090665221214294},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.501971960067749},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.48833414912223816},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.45780420303344727},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45546823740005493},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.44339966773986816},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16753286123275757},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.11761537194252014},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10249689221382141}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.749013364315033},{"id":"https://openalex.org/C51929080","wikidata":"https://www.wikidata.org/wiki/Q2425187","display_name":"Codebase","level":3,"score":0.7480430603027344},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5320397615432739},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5090665221214294},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.501971960067749},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.48833414912223816},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.45780420303344727},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45546823740005493},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.44339966773986816},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16753286123275757},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.11761537194252014},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10249689221382141},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3548606.3559381","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3559381","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559381","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2110.01005","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2110.01005","pdf_url":"https://arxiv.org/pdf/2110.01005","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3548606.3559381","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3559381","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559381","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7300000190734863,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G4035360230","display_name":null,"funder_award_id":"1943100, 1920462, 2114074, 1908494","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4832238488","display_name":null,"funder_award_id":"N66001-22-C-4028","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320308737","display_name":"Facebook","ror":"https://ror.org/01zbnvs85"},{"id":"https://openalex.org/F4320309327","display_name":"Google","ror":"https://ror.org/00njsd438"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4307533935.pdf","grobid_xml":"https://content.openalex.org/works/W4307533935.grobid-xml"},"referenced_works_count":63,"referenced_works":["https://openalex.org/W1491178396","https://openalex.org/W1517949462","https://openalex.org/W1563577331","https://openalex.org/W1935358945","https://openalex.org/W1985752637","https://openalex.org/W1987846217","https://openalex.org/W1992114977","https://openalex.org/W2008810193","https://openalex.org/W2012921353","https://openalex.org/W2091939272","https://openalex.org/W2092860912","https://openalex.org/W2095462340","https://openalex.org/W2103475742","https://openalex.org/W2108911687","https://openalex.org/W2114345296","https://openalex.org/W2133723082","https://openalex.org/W2144344516","https://openalex.org/W2149237601","https://openalex.org/W2162126440","https://openalex.org/W2165004968","https://openalex.org/W2168103835","https://openalex.org/W2182467309","https://openalex.org/W2188710721","https://openalex.org/W2217843339","https://openalex.org/W2218971720","https://openalex.org/W2220001701","https://openalex.org/W2229250518","https://openalex.org/W2257242910","https://openalex.org/W2283736639","https://openalex.org/W2330649411","https://openalex.org/W2350778671","https://openalex.org/W2399231848","https://openalex.org/W2400427673","https://openalex.org/W2544992706","https://openalex.org/W2751141094","https://openalex.org/W2752929869","https://openalex.org/W2771377978","https://openalex.org/W2803936458","https://openalex.org/W2882992559","https://openalex.org/W2884283597","https://openalex.org/W2885602459","https://openalex.org/W2889095445","https://openalex.org/W2891458271","https://openalex.org/W2893478812","https://openalex.org/W2912998789","https://openalex.org/W2918693378","https://openalex.org/W2954709499","https://openalex.org/W2968483187","https://openalex.org/W2970044827","https://openalex.org/W2985320478","https://openalex.org/W2998879240","https://openalex.org/W3010199212","https://openalex.org/W3033482452","https://openalex.org/W3086883688","https://openalex.org/W3107488247","https://openalex.org/W3168148707","https://openalex.org/W3173648532","https://openalex.org/W3187895569","https://openalex.org/W3214713579","https://openalex.org/W4232808412","https://openalex.org/W4237127063","https://openalex.org/W4242528790","https://openalex.org/W4298512898"],"related_works":["https://openalex.org/W4210714572","https://openalex.org/W236697550","https://openalex.org/W2966393348","https://openalex.org/W2603924900","https://openalex.org/W2024584766","https://openalex.org/W4233135075","https://openalex.org/W2771478719","https://openalex.org/W1581911077","https://openalex.org/W2980050408","https://openalex.org/W2284039665"],"abstract_inverted_index":{"OAuth":[0,41,65,91,106],"protocols":[1],"have":[2],"been":[3,20],"widely":[4,33],"adopted":[5],"to":[6,22,54],"simplify":[7],"user":[8],"authentication":[9],"and":[10,43,47,58,142],"service":[11,31,66,79],"authorization":[12],"for":[13,87],"third-party":[14],"applications.":[15],"However,":[16],"little":[17],"effort":[18],"has":[19,117],"devoted":[21],"automatically":[23],"checking":[24],"the":[25,28,40,62,95,137],"security":[26,44,72],"of":[27,64,78,97,104,110,124,128,139],"libraries":[29,107,141],"that":[30],"providers":[32],"use.":[34],"In":[35],"this":[36],"paper,":[37],"we":[38],"formalize":[39],"specifications":[42],"best":[45],"practices,":[46],"design":[48],"Cerberus,":[49],"an":[50],"automated":[51],"static":[52],"analyzer,":[53],"find":[55],"logical":[56,125],"flaws":[57],"identify":[59],"vulnerabilities":[60,120],"in":[61,74],"implementation":[63],"provider":[67,80],"libraries.":[68],"To":[69],"efficiently":[70],"detect":[71],"violations":[73],"a":[75,84],"large":[76],"codebase":[77],"implementation,":[81],"Cerberus":[82,98,116],"employs":[83],"query-driven":[85],"algorithm":[86],"answering":[88],"queries":[89],"about":[90],"specifications.":[92],"We":[93,133],"demonstrate":[94],"effectiveness":[96],"by":[99,136],"evaluating":[100],"it":[101],"on":[102],"datasets":[103],"popular":[105],"with":[108],"millions":[109],"downloads.":[111],"Among":[112],"these":[113],"high-profile":[114],"libraries,":[115],"identified":[118],"47":[119],"from":[121],"ten":[122],"classes":[123],"flaws,":[126],"24":[127],"which":[129],"were":[130],"previously":[131],"unknown.":[132],"got":[134],"acknowledged":[135],"developers":[138],"eight":[140],"had":[143],"three":[144],"accepted":[145],"CVEs.":[146]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2022-11-03T00:00:00"}
