{"id":"https://openalex.org/W3107416433","doi":"https://doi.org/10.1145/3368089.3417056","title":"Improving cybersecurity hygiene through JIT patching","display_name":"Improving cybersecurity hygiene through JIT patching","publication_year":2020,"publication_date":"2020-11-08","ids":{"openalex":"https://openalex.org/W3107416433","doi":"https://doi.org/10.1145/3368089.3417056","mag":"3107416433"},"language":"en","primary_location":{"id":"doi:10.1145/3368089.3417056","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3368089.3417056","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015875907","display_name":"Frederico Araujo","orcid":"https://orcid.org/0000-0001-5143-8318"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Frederico Araujo","raw_affiliation_strings":["IBM Research, USA"],"affiliations":[{"raw_affiliation_string":"IBM Research, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111373813","display_name":"Teryl Taylor","orcid":"https://orcid.org/0000-0002-4915-1286"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Teryl Taylor","raw_affiliation_strings":["IBM Research, USA"],"affiliations":[{"raw_affiliation_string":"IBM Research, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5015875907"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.696,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.8577495,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1421","last_page":"1432"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7907377481460571},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7874418497085571},{"id":"https://openalex.org/keywords/expediting","display_name":"Expediting","score":0.7057169079780579},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6313725709915161},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5966374278068542},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5776556730270386},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.4343750774860382},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.40983307361602783},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3507770299911499},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3190401792526245},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18204054236412048},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.14063528180122375}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7907377481460571},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7874418497085571},{"id":"https://openalex.org/C134448949","wikidata":"https://www.wikidata.org/wiki/Q1384274","display_name":"Expediting","level":2,"score":0.7057169079780579},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6313725709915161},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5966374278068542},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5776556730270386},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.4343750774860382},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.40983307361602783},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3507770299911499},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3190401792526245},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18204054236412048},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.14063528180122375},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3368089.3417056","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3368089.3417056","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W86806703","https://openalex.org/W109909280","https://openalex.org/W183414539","https://openalex.org/W656831760","https://openalex.org/W806478328","https://openalex.org/W1494640733","https://openalex.org/W1497716074","https://openalex.org/W1514368868","https://openalex.org/W1517527854","https://openalex.org/W1529311848","https://openalex.org/W1534090575","https://openalex.org/W1552047811","https://openalex.org/W1573594453","https://openalex.org/W1590782122","https://openalex.org/W1926641597","https://openalex.org/W1969898537","https://openalex.org/W1975627814","https://openalex.org/W1979305135","https://openalex.org/W1998009565","https://openalex.org/W2019814385","https://openalex.org/W2024170198","https://openalex.org/W2026711169","https://openalex.org/W2027479906","https://openalex.org/W2055830810","https://openalex.org/W2062340141","https://openalex.org/W2072610876","https://openalex.org/W2077937403","https://openalex.org/W2108247069","https://openalex.org/W2112731379","https://openalex.org/W2113103747","https://openalex.org/W2114339651","https://openalex.org/W2115175195","https://openalex.org/W2117152987","https://openalex.org/W2119746900","https://openalex.org/W2128159601","https://openalex.org/W2129117233","https://openalex.org/W2132243687","https://openalex.org/W2137621008","https://openalex.org/W2139430599","https://openalex.org/W2147767253","https://openalex.org/W2150142104","https://openalex.org/W2151915331","https://openalex.org/W2155917445","https://openalex.org/W2161482094","https://openalex.org/W2176235539","https://openalex.org/W2199584834","https://openalex.org/W2400355634","https://openalex.org/W2752365765","https://openalex.org/W2798432239","https://openalex.org/W2985119528","https://openalex.org/W2987218689","https://openalex.org/W3000208506","https://openalex.org/W4231606388","https://openalex.org/W6629750234","https://openalex.org/W6630780968","https://openalex.org/W6744124473"],"related_works":["https://openalex.org/W4200107511","https://openalex.org/W2393340519","https://openalex.org/W4298219515","https://openalex.org/W3118510577","https://openalex.org/W2021298062","https://openalex.org/W2185499427","https://openalex.org/W2891427086","https://openalex.org/W1883246888","https://openalex.org/W2371301679","https://openalex.org/W2527966616"],"abstract_inverted_index":{"Vulnerability":[0],"patch":[1,76],"management":[2],"remains":[3],"one":[4],"of":[5,44],"the":[6],"most":[7],"complex":[8],"issues":[9],"facing":[10],"modern":[11],"enterprises;":[12],"companies":[13],"struggle":[14],"to":[15,30],"test":[16],"and":[17,69,79],"deploy":[18],"new":[19],"patches":[20],"across":[21],"their":[22,47],"networks,":[23],"often":[24],"leaving":[25],"myriad":[26],"attack":[27,71],"vectors":[28],"vulnerable":[29],"exploits.":[31],"This":[32],"problem":[33],"is":[34,73],"exacerbated":[35],"by":[36,75],"enterprise":[37],"server":[38],"applications,":[39],"which":[40],"expose":[41],"tremendous":[42],"amounts":[43],"information":[45],"about":[46],"security":[48],"postures,":[49],"greatly":[50],"expediting":[51],"attackers'":[52],"reconnaissance":[53],"incursions":[54],"(e.g.,":[55],"knowledge":[56],"gathering":[57],"attacks).":[58],"Unfortunately,":[59],"current":[60],"patching":[61],"processes":[62],"offer":[63],"no":[64],"insights":[65],"into":[66],"attacker":[67],"activities,":[68],"prompt":[70],"remediation":[72],"hindered":[74],"compatibility":[77],"considerations":[78],"deployment":[80],"cycles.":[81]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
