{"id":"https://openalex.org/W3182061068","doi":"https://doi.org/10.22152/programming-journal.org/2022/6/1","title":"Deriving Static Security Testing from Runtime Security Protection for Web Applications","display_name":"Deriving Static Security Testing from Runtime Security Protection for Web Applications","publication_year":2021,"publication_date":"2021-07-15","ids":{"openalex":"https://openalex.org/W3182061068","doi":"https://doi.org/10.22152/programming-journal.org/2022/6/1","mag":"3182061068"},"language":"en","primary_location":{"id":"doi:10.22152/programming-journal.org/2022/6/1","is_oa":true,"landing_page_url":"https://doi.org/10.22152/programming-journal.org/2022/6/1","pdf_url":"https://arxiv.org/pdf/2107.07300v1","source":{"id":"https://openalex.org/S4210199781","display_name":"The Art Science and Engineering of Programming","issn_l":"2473-7321","issn":["2473-7321"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Art, Science, and Engineering of Programming","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://arxiv.org/pdf/2107.07300v1","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Angel Luis Scull Pupo","orcid":null},"institutions":[{"id":"https://openalex.org/I13469542","display_name":"Vrije Universiteit Brussel","ror":"https://ror.org/006e5kg04","country_code":"BE","type":"education","lineage":["https://openalex.org/I13469542"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Angel Luis Scull Pupo","raw_affiliation_strings":["Vrije Universiteit Brussel, Belgium"],"affiliations":[{"raw_affiliation_string":"Vrije Universiteit Brussel, Belgium","institution_ids":["https://openalex.org/I13469542"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jens Nicolay","orcid":null},"institutions":[{"id":"https://openalex.org/I13469542","display_name":"Vrije Universiteit Brussel","ror":"https://ror.org/006e5kg04","country_code":"BE","type":"education","lineage":["https://openalex.org/I13469542"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Jens Nicolay","raw_affiliation_strings":["Vrije Universiteit Brussel, Belgium"],"affiliations":[{"raw_affiliation_string":"Vrije Universiteit Brussel, Belgium","institution_ids":["https://openalex.org/I13469542"]}]},{"author_position":"last","author":{"id":null,"display_name":"Elisa Gonzalez Boix","orcid":null},"institutions":[{"id":"https://openalex.org/I13469542","display_name":"Vrije Universiteit Brussel","ror":"https://ror.org/006e5kg04","country_code":"BE","type":"education","lineage":["https://openalex.org/I13469542"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Elisa Gonzalez Boix","raw_affiliation_strings":["Vrije Universiteit Brussel, Belgium"],"affiliations":[{"raw_affiliation_string":"Vrije Universiteit Brussel, Belgium","institution_ids":["https://openalex.org/I13469542"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I13469542"],"apc_list":null,"apc_paid":null,"fwci":0.42,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.68929394,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.35019999742507935,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.35019999742507935,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.3314000070095062,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.10869999974966049,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.8112999796867371},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.592199981212616},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.5358999967575073},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.515999972820282},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.48989999294281006},{"id":"https://openalex.org/keywords/application-security","display_name":"Application security","score":0.47920000553131104},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4657000005245209},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.45669999718666077},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.45239999890327454}],"concepts":[{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.8112999796867371},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7286999821662903},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6467999815940857},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.592199981212616},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.5358999967575073},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.515999972820282},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.48989999294281006},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.47920000553131104},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4657000005245209},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.45669999718666077},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.45239999890327454},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4514000117778778},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4422999918460846},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.42750000953674316},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3458999991416931},{"id":"https://openalex.org/C2777407602","wikidata":"https://www.wikidata.org/wiki/Q1888932","display_name":"Mandatory access control","level":4,"score":0.3287999927997589},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3255999982357025},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.3237999975681305},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.30869999527931213},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3061999976634979},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3061000108718872},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.3000999987125397},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.28459998965263367},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.2824999988079071},{"id":"https://openalex.org/C124184767","wikidata":"https://www.wikidata.org/wiki/Q1591311","display_name":"Scram","level":2,"score":0.2700999975204468}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.22152/programming-journal.org/2022/6/1","is_oa":true,"landing_page_url":"https://doi.org/10.22152/programming-journal.org/2022/6/1","pdf_url":"https://arxiv.org/pdf/2107.07300v1","source":{"id":"https://openalex.org/S4210199781","display_name":"The Art Science and Engineering of Programming","issn_l":"2473-7321","issn":["2473-7321"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Art, Science, and Engineering of Programming","raw_type":"journal-article"},{"id":"pmh:oai:vubissmart:VUBISSMART:2000:151853","is_oa":false,"landing_page_url":"https://biblio.vub.ac.be/vubir/deriving-static-security-testing-from-runtime-security-protection-for-web-applications(789fb0e6-41fc-4f4c-a8c2-64abe008651e).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306402573","display_name":"VUBIR (Vrije Universiteit Brussel)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I13469542","host_organization_name":"Vrije Universiteit Brussel","host_organization_lineage":["https://openalex.org/I13469542"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"acceptedVersion"},{"id":"pmh:oai:arXiv.org:2107.07300","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2107.07300","pdf_url":"https://arxiv.org/pdf/2107.07300","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.22152/programming-journal.org/2022/6/1","is_oa":true,"landing_page_url":"https://doi.org/10.22152/programming-journal.org/2022/6/1","pdf_url":"https://arxiv.org/pdf/2107.07300v1","source":{"id":"https://openalex.org/S4210199781","display_name":"The Art Science and Engineering of Programming","issn_l":"2473-7321","issn":["2473-7321"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Art, Science, and Engineering of Programming","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3182061068.pdf","grobid_xml":"https://content.openalex.org/works/W3182061068.grobid-xml"},"referenced_works_count":45,"referenced_works":["https://openalex.org/W58852127","https://openalex.org/W114581357","https://openalex.org/W1183828699","https://openalex.org/W1486603200","https://openalex.org/W1593942753","https://openalex.org/W1969883639","https://openalex.org/W1987647365","https://openalex.org/W2036639103","https://openalex.org/W2045424609","https://openalex.org/W2060857434","https://openalex.org/W2061640969","https://openalex.org/W2066195326","https://openalex.org/W2068531859","https://openalex.org/W2069307783","https://openalex.org/W2074935412","https://openalex.org/W2100148636","https://openalex.org/W2115499999","https://openalex.org/W2121194882","https://openalex.org/W2123582298","https://openalex.org/W2125357166","https://openalex.org/W2128835824","https://openalex.org/W2140021378","https://openalex.org/W2146717998","https://openalex.org/W2150138014","https://openalex.org/W2151320244","https://openalex.org/W2155735696","https://openalex.org/W2156250856","https://openalex.org/W2165304392","https://openalex.org/W2167809103","https://openalex.org/W2204102791","https://openalex.org/W2532471378","https://openalex.org/W2610242999","https://openalex.org/W2765755114","https://openalex.org/W2781246331","https://openalex.org/W2797835509","https://openalex.org/W2798483320","https://openalex.org/W2888980023","https://openalex.org/W2987470874","https://openalex.org/W3039057315","https://openalex.org/W3182061068","https://openalex.org/W4245749384","https://openalex.org/W4251376203","https://openalex.org/W4254691308","https://openalex.org/W4391285994","https://openalex.org/W6884301979"],"related_works":[],"abstract_inverted_index":{"Context:":[0],"Static":[1],"Application":[2,8],"Security":[3,9],"Testing":[4],"(SAST)":[5],"and":[6,14,20],"Runtime":[7],"Protection":[10],"(RASP)":[11],"are":[12],"important":[13],"complementary":[15],"techniques":[16],"used":[17],"for":[18],"detecting":[19],"enforcing":[21],"application-level":[22],"security":[23],"policies":[24],"in":[25],"web":[26],"applications.":[27]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2021-07-19T00:00:00"}
