{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:34:51Z","timestamp":1730259291245,"version":"3.28.0"},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/icstw.2019.00040","type":"proceedings-article","created":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T23:26:16Z","timestamp":1559863576000},"page":"122-130","source":"Crossref","is-referenced-by-count":8,"title":["Practical Combinatorial Testing for XSS Detection using Locally Optimized Attack Models"],"prefix":"10.1109","author":[{"given":"Dimitris E.","family":"Simos","sequence":"first","affiliation":[]},{"given":"Bernhard","family":"Garn","sequence":"additional","affiliation":[]},{"given":"Jovan","family":"Zivanovic","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Leithner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CMPASS.1994.318466"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4375"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2015.7107436"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2631890.2631894"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.38"},{"key":"ref30","first-page":"1","article-title":"Attack pattern-based combinatorial testing","author":"bozic","year":"2014","journal-title":"Proceedings of the 9th International Workshop on Automation of Software Test"},{"key":"ref37","article-title":"Riding out DOMs-day: Toward Detecting and Preventing DOM Cross-Site Scripting","author":"melicher","year":"2014","journal-title":"NDSS 2018 Network and Distributed System Security Symposium"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516703"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.319"},{"key":"ref34","first-page":"255","article-title":"Input parameter modeling for combination strategies","author":"grindal","year":"0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557550"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671300"},{"key":"ref29","first-page":"103","article-title":"Towards elimination of cross-site scripting on mobile versions of web applications","author":"javed","year":"2013","journal-title":"Information Security Applications 14th International Workshop WISA 2013"},{"key":"ref2","article-title":"Web application attack report","author":"beery","year":"2013","journal-title":"Imperva Annual Report"},{"key":"ref1","article-title":"Global internet security threat report","volume":"xiv","author":"fossi","year":"2009","journal-title":"Symantec"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23021"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2896921.2896929"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2011.7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2012.34"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IWSESS.2009.5068458"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.181"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483776"},{"year":"2018","key":"ref50","article-title":"Burp Suite"},{"year":"2018","key":"ref51","article-title":"w3af"},{"article-title":"Arachni","year":"2018","author":"llc","key":"ref52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.58"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s13173-017-0051-1"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/ISSRE.1995.497647","article-title":"Antirandom testing: getting the most out of black-box testing","author":"malaiya","year":"1995","journal-title":"Software Reliability Engineering 1995 Proceedings Sixth International Symposium on"},{"journal-title":"Introduction to Combinatorial Testing","year":"2013","author":"kuhn","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.114"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.314"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381800"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.22"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046775"},{"key":"ref19","first-page":"10","article-title":"Toward automated detection of logic vulnerabilities in web applications","author":"felmetsger","year":"2010","journal-title":"Proceedings of the 19th USENIX Conference on Security"},{"article-title":"OWASP Top 10 2013","year":"2013","author":"williams","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270294"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.07.010"},{"article-title":"OWASP Top 10 2017","year":"2017","author":"andrew van der stock","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IWAST.2013.6595794"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2013.58"},{"year":"2014","key":"ref49","article-title":"RXSS Security Audit Results"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070521"},{"year":"2018","key":"ref46","article-title":"MyBB"},{"year":"2018","key":"ref45","article-title":"Piwigo"},{"year":"2018","key":"ref48","article-title":"W3C online tidy service"},{"year":"2018","key":"ref47","article-title":"Koha Library Software"},{"year":"2018","key":"ref42","article-title":"Content Security Policy"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.52"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2015.7340766"},{"year":"0","key":"ref43","article-title":"WAVSEP - The Web Application Vulnerability Scanner Evaluation Project"}],"event":{"name":"2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","start":{"date-parts":[[2019,4,22]]},"location":"Xi'an, China","end":{"date-parts":[[2019,4,23]]}},"container-title":["2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8725607\/8728894\/08728914.pdf?arnumber=8728914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:54:16Z","timestamp":1658094856000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8728914\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/icstw.2019.00040","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}