{"id":"https://openalex.org/W4402957867","doi":"https://doi.org/10.1145/3678890.3678928","title":"Beyond REST: Introducing APIF for Comprehensive API Vulnerability Fuzzing","display_name":"Beyond REST: Introducing APIF for Comprehensive API Vulnerability Fuzzing","publication_year":2024,"publication_date":"2024-09-29","ids":{"openalex":"https://openalex.org/W4402957867","doi":"https://doi.org/10.1145/3678890.3678928"},"language":"en","primary_location":{"id":"doi:10.1145/3678890.3678928","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678890.3678928","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3678890.3678928","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108304493","display_name":"Yu Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Wang","raw_affiliation_strings":["Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100578113","display_name":"Yue Xu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yue Xu","raw_affiliation_strings":["PTLAB, Singapore and TrustAI Pte.Ltd., Singapore"],"affiliations":[{"raw_affiliation_string":"PTLAB, Singapore and TrustAI Pte.Ltd., Singapore","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5108304493"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":1.6284,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.87758955,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"435","last_page":"449"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9846438765525818},{"id":"https://openalex.org/keywords/rest","display_name":"Rest (music)","score":0.8152435421943665},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.655563473701477},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6355851888656616},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4285241365432739},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1512051820755005},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.10487300157546997}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9846438765525818},{"id":"https://openalex.org/C77265313","wikidata":"https://www.wikidata.org/wiki/Q879844","display_name":"Rest (music)","level":2,"score":0.8152435421943665},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.655563473701477},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6355851888656616},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4285241365432739},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1512051820755005},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.10487300157546997},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C164705383","wikidata":"https://www.wikidata.org/wiki/Q10379","display_name":"Cardiology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3678890.3678928","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678890.3678928","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3678890.3678928","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678890.3678928","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1995223846","https://openalex.org/W1998613841","https://openalex.org/W2468358417","https://openalex.org/W2901654758","https://openalex.org/W2938295127","https://openalex.org/W2955835447","https://openalex.org/W2968373634","https://openalex.org/W2982121747","https://openalex.org/W3043201130","https://openalex.org/W3047848029","https://openalex.org/W3099713549","https://openalex.org/W3173777979","https://openalex.org/W3177546869","https://openalex.org/W4213274161","https://openalex.org/W4220791610","https://openalex.org/W4226169996","https://openalex.org/W4281721316","https://openalex.org/W4284680450","https://openalex.org/W4285805549","https://openalex.org/W4308643315","https://openalex.org/W4313563484","https://openalex.org/W4321482783","https://openalex.org/W4384155543","https://openalex.org/W4384345660","https://openalex.org/W4390187615"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W3203597304","https://openalex.org/W4385301282","https://openalex.org/W2990186179","https://openalex.org/W4248424560","https://openalex.org/W3023977444","https://openalex.org/W4210660460"],"abstract_inverted_index":{"In":[0],"modern":[1],"software":[2],"development,":[3],"APIs":[4],"play":[5],"a":[6],"crucial":[7],"role":[8],"as":[9,16],"they":[10],"facilitate":[11],"platform":[12],"interoperability":[13],"and":[14,28,35,46,71],"serve":[15],"conduits":[17],"for":[18,60],"data":[19],"transmission.":[20],"API":[21],"fuzzing":[22,47],"has":[23],"emerged":[24],"to":[25],"explore":[26],"errors":[27],"vulnerabilities":[29],"in":[30,65,82],"web":[31],"applications,":[32],"cloud":[33],"services,":[34],"IoT":[36],"systems.":[37],"Its":[38],"effectiveness":[39,67],"highly":[40],"depends":[41],"on":[42,55],"parameter":[43],"structure":[44],"analysis":[45],"request":[48],"generation.":[49],"However,":[50],"existing":[51],"methods":[52,81],"focus":[53],"more":[54],"RESTful":[56],"APIs,":[57],"lacking":[58],"generalizability":[59],"other":[61],"protocols.":[62],"Additionally,":[63],"shortcomings":[64],"the":[66,76],"of":[68,79],"test":[69],"payloads":[70],"testing":[72],"efficiency":[73],"have":[74],"limited":[75],"large-scale":[77],"application":[78],"these":[80],"real-world":[83],"scenarios.":[84]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
