{"id":"https://openalex.org/W4313563416","doi":"https://doi.org/10.1145/3551349.3556933","title":"Precise (Un)Affected Version Analysis for Web Vulnerabilities","display_name":"Precise (Un)Affected Version Analysis for Web Vulnerabilities","publication_year":2022,"publication_date":"2022-10-10","ids":{"openalex":"https://openalex.org/W4313563416","doi":"https://doi.org/10.1145/3551349.3556933"},"language":"en","primary_location":{"id":"doi:10.1145/3551349.3556933","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3551349.3556933","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3556933","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3556933","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112889238","display_name":"Youkun Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Youkun Shi","raw_affiliation_strings":["Fudan University, China"],"affiliations":[{"raw_affiliation_string":"Fudan University, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100368650","display_name":"Yuan Zhang","orcid":"https://orcid.org/0000-0001-5538-1478"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Zhang","raw_affiliation_strings":["Fudan University, China"],"affiliations":[{"raw_affiliation_string":"Fudan University, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105573624","display_name":"Tianhan Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianhan Luo","raw_affiliation_strings":["Fudan University, China"],"affiliations":[{"raw_affiliation_string":"Fudan University, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008027806","display_name":"Xiangyu Mao","orcid":null},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangyu Mao","raw_affiliation_strings":["Fudan University, China"],"affiliations":[{"raw_affiliation_string":"Fudan University, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052437722","display_name":"Min Yang","orcid":"https://orcid.org/0000-0001-9714-5545"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Yang","raw_affiliation_strings":["Fudan University, China"],"affiliations":[{"raw_affiliation_string":"Fudan University, China","institution_ids":["https://openalex.org/I24943067"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5112889238"],"corresponding_institution_ids":["https://openalex.org/I24943067"],"apc_list":null,"apc_paid":null,"fwci":2.122,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.90233306,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7941781282424927},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.7419286370277405},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6105434894561768},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.5611424446105957},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5469255447387695},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.5258108973503113},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5003917217254639},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.484640896320343},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4225383996963501},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3544839024543762},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.19732537865638733},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.18048310279846191},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.06848058104515076}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7941781282424927},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.7419286370277405},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6105434894561768},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.5611424446105957},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5469255447387695},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.5258108973503113},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5003917217254639},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.484640896320343},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4225383996963501},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3544839024543762},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.19732537865638733},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.18048310279846191},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.06848058104515076},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3551349.3556933","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3551349.3556933","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3556933","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3551349.3556933","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3551349.3556933","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3556933","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6299999952316284,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3062299927","display_name":null,"funder_award_id":"21QA1400700","funder_id":"https://openalex.org/F4320327803","funder_display_name":"Shanghai Rising-Star Program"},{"id":"https://openalex.org/G3835461838","display_name":null,"funder_award_id":"U1836210, U1836213, 62172105, 61972099, 62172104, 62102091, 62102093","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5125653371","display_name":null,"funder_award_id":"19ZR1404800","funder_id":"https://openalex.org/F4320309612","funder_display_name":"Natural Science Foundation of Shanghai"}],"funders":[{"id":"https://openalex.org/F4320309612","display_name":"Natural Science Foundation of Shanghai","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327803","display_name":"Shanghai Rising-Star Program","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4313563416.pdf","grobid_xml":"https://content.openalex.org/works/W4313563416.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1982132104","https://openalex.org/W1990762361","https://openalex.org/W2017035494","https://openalex.org/W2023887108","https://openalex.org/W2065489029","https://openalex.org/W2071067812","https://openalex.org/W2085925880","https://openalex.org/W2086631206","https://openalex.org/W2118278564","https://openalex.org/W2274324447","https://openalex.org/W2296241649","https://openalex.org/W2497508572","https://openalex.org/W2530824252","https://openalex.org/W2534610146","https://openalex.org/W2559935471","https://openalex.org/W2634106992","https://openalex.org/W2732351623","https://openalex.org/W2752602409","https://openalex.org/W2781491433","https://openalex.org/W2794744252","https://openalex.org/W2808045475","https://openalex.org/W2967904600","https://openalex.org/W3101228802","https://openalex.org/W3116924855","https://openalex.org/W3178549314","https://openalex.org/W3191226037","https://openalex.org/W3214251355","https://openalex.org/W4224323202","https://openalex.org/W4242704962","https://openalex.org/W4301168982"],"related_works":["https://openalex.org/W2070218579","https://openalex.org/W4385770215","https://openalex.org/W1628063087","https://openalex.org/W1555317716","https://openalex.org/W2610653382","https://openalex.org/W2003115932","https://openalex.org/W2265061089","https://openalex.org/W2892222327","https://openalex.org/W4249792249","https://openalex.org/W2946543971"],"abstract_inverted_index":{"Web":[0],"applications":[1],"are":[2,56],"attractive":[3],"attack":[4],"targets":[5],"given":[6],"their":[7,27],"popularity":[8],"and":[9,51,92],"large":[10,96],"number":[11],"of":[12,18,24,59,102],"vulnerabilities.":[13],"To":[14],"mitigate":[15],"the":[16,103],"threat":[17],"web":[19],"vulnerabilities,":[20],"an":[21],"important":[22],"piece":[23],"information":[25,39,67],"is":[26,32,68,82],"affected":[28,37,45,107],"versions.":[29],"However,":[30],"it":[31,81],"non-trivial":[33],"to":[34,61,85],"build":[35],"accurate":[36],"version":[38,43],"because":[40],"confirming":[41],"a":[42,64,71,87,95],"as":[44,106],"or":[46,108],"unaffected":[47],"requires":[48],"security":[49],"expertise":[50],"huge":[52],"efforts,":[53],"while":[54],"there":[55],"usually":[57],"hundreds":[58],"versions":[60,105],"examine.":[62],"As":[63],"result,":[65],"such":[66],"maintained":[69],"in":[70,74],"low-quality":[72],"manner":[73],"almost":[75],"every":[76],"public":[77],"vulnerability":[78],"database.":[79],"Therefore,":[80],"extremely":[83],"useful":[84],"have":[86],"tool":[88],"that":[89],"can":[90],"automatically":[91],"precisely":[93],"examine":[94],"part":[97],"(even":[98],"if":[99],"not":[100],"all)":[101],"software":[104],"unaffected.":[109]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
