{"id":"https://openalex.org/W4405181104","doi":"https://doi.org/10.1145/3658644.3691377","title":"Poster: Automated Dependency Mapping for Web API Security Testing Using Large Language Models","display_name":"Poster: Automated Dependency Mapping for Web API Security Testing Using Large Language Models","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405181104","doi":"https://doi.org/10.1145/3658644.3691377"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3691377","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3691377","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691377","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691377","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015676987","display_name":"Wanpeng Li","orcid":"https://orcid.org/0000-0002-6396-9578"},"institutions":[{"id":"https://openalex.org/I195460627","display_name":"University of Aberdeen","ror":"https://ror.org/016476m91","country_code":"GB","type":"education","lineage":["https://openalex.org/I195460627"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Wanpeng Li","raw_affiliation_strings":["University of Aberdeen, Aberdeen, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Aberdeen, Aberdeen, United Kingdom","institution_ids":["https://openalex.org/I195460627"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023978917","display_name":"Yuejun Guo","orcid":"https://orcid.org/0000-0002-5535-2420"},"institutions":[{"id":"https://openalex.org/I4210112527","display_name":"Luxembourg Institute of Science and Technology","ror":"https://ror.org/01t178j62","country_code":"LU","type":"nonprofit","lineage":["https://openalex.org/I4210112527"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Yuejun Guo","raw_affiliation_strings":["Luxembourg Institute of Science and Technology, Esch-sur-Alzette, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Luxembourg Institute of Science and Technology, Esch-sur-Alzette, Luxembourg","institution_ids":["https://openalex.org/I4210112527"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5015676987"],"corresponding_institution_ids":["https://openalex.org/I195460627"],"apc_list":null,"apc_paid":null,"fwci":0.343,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.63954741,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"5024","last_page":"5026"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9745000004768372,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9595000147819519,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8368787169456482},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.7525297403335571},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.49764779210090637},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3959014415740967},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.32091087102890015}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8368787169456482},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.7525297403335571},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.49764779210090637},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3959014415740967},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.32091087102890015}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3691377","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3691377","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691377","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3691377","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3691377","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691377","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3293115889","display_name":null,"funder_award_id":"101070303","funder_id":"https://openalex.org/F4320334322","funder_display_name":"HORIZON EUROPE Framework Programme"},{"id":"https://openalex.org/G5242316204","display_name":null,"funder_award_id":"101070303","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8051717526","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320334322","display_name":"HORIZON EUROPE Framework Programme","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405181104.pdf","grobid_xml":"https://content.openalex.org/works/W4405181104.grobid-xml"},"referenced_works_count":1,"referenced_works":["https://openalex.org/W4398785927"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Dependency":[0],"extraction":[1],"is":[2,45],"crucial":[3],"in":[4,83],"web":[5,84],"API":[6,15,32],"security":[7,65],"testing,":[8],"as":[9,94],"it":[10],"helps":[11],"identify":[12],"the":[13,62,72,88,110,115],"required":[14],"sequences":[16],"to":[17,38,54,79,108,140],"exploit":[18],"a":[19,136,137],"vulnerability.":[20],"Traditional":[21],"methods":[22],"are":[23],"generally":[24],"rule-based":[25,142],"and":[26,49,57,97,102,120],"require":[27],"extensive":[28],"manual":[29,43,118],"analysis":[30,119],"of":[31,64,74,90],"specification":[33],"documents":[34],"by":[35],"domain":[36],"experts":[37],"formulate":[39],"appropriate":[40],"rules.":[41],"This":[42],"process":[44],"not":[46],"only":[47],"time-consuming":[48],"labor-intensive":[50],"but":[51],"also":[52],"prone":[53],"missing":[55],"dependencies":[56],"inaccuracies,":[58],"which":[59,99],"can":[60,130],"compromise":[61],"effectiveness":[63],"testing.":[66],"In":[67],"this":[68,128],"paper,":[69],"we":[70,106],"explore":[71],"potential":[73],"large":[75],"language":[76],"models":[77],"(LLMs)":[78],"automate":[80],"dependency":[81,111,133],"mapping":[82,112],"APIs.":[85],"By":[86],"leveraging":[87],"capabilities":[89],"advanced":[91],"LLMs":[92],"such":[93],"GPT-3.5,":[95],"Mistral-7B-Instruct,":[96],"Llama-3-8B-Instruct,":[98],"include":[100],"understanding":[101],"generating":[103],"natural":[104],"language,":[105],"aim":[107],"streamline":[109],"process,":[113],"reducing":[114],"need":[116],"for":[117],"enhancing":[121],"accuracy.":[122],"Our":[123],"preliminary":[124],"experiments":[125],"demonstrate":[126],"that":[127],"approach":[129],"effectively":[131],"build":[132],"mappings,":[134],"offering":[135],"promising":[138],"alternative":[139],"traditional":[141],"approaches.":[143]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
