{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:40:35Z","timestamp":1725763235134},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3540250.3558944","type":"proceedings-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T20:46:22Z","timestamp":1668026782000},"page":"1367-1378","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Input splitting for cloud-based static application security testing platforms"],"prefix":"10.1145","author":[{"given":"Maria","family":"Christakis","sequence":"first","affiliation":[{"name":"MPI-SWS, Germany"}]},{"given":"Thomas","family":"Cottenier","sequence":"additional","affiliation":[{"name":"Amazon Web Services, USA"}]},{"given":"Antonio","family":"Filieri","sequence":"additional","affiliation":[{"name":"Amazon Web Services, USA"}]},{"given":"Linghui","family":"Luo","sequence":"additional","affiliation":[{"name":"Amazon Web Services, Germany"}]},{"given":"Muhammad Numair","family":"Mansur","sequence":"additional","affiliation":[{"name":"MPI-SWS, Germany"}]},{"given":"Lee","family":"Pike","sequence":"additional","affiliation":[{"name":"Amazon Web Services, USA"}]},{"given":"Nicol\u00e1s","family":"Rosner","sequence":"additional","affiliation":[{"name":"Amazon Web Services, USA"}]},{"given":"Martin","family":"Sch\u00e4f","sequence":"additional","affiliation":[{"name":"Amazon Web Services, USA"}]},{"given":"Aritra","family":"Sengupta","sequence":"additional","affiliation":[{"name":"Amazon Web Services, USA"}]},{"given":"Willem","family":"Visser","sequence":"additional","affiliation":[{"name":"Amazon Web Services, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254091"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568243"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884816"},{"key":"e_1_3_2_1_4_1","unstructured":"Python Code Quality Authority. 2008. Bandit. https:\/\/bandit.readthedocs.io\/en\/latest\/ \t\t\t\t Python Code Quality Authority. 2008. Bandit. https:\/\/bandit.readthedocs.io\/en\/latest\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/0602019"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606642"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45139-0_13"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2676977"},{"key":"e_1_3_2_1_9_1","unstructured":"Andrew Binstock. 2022. Gitleaks: a SAST tool for detecting and preventing hardcoded secrets like passwords api keys and tokens in git repositories. https:\/\/blogs.oracle.com\/javamagazine\/post\/java-class-file-constant-pool \t\t\t\t Andrew Binstock. 2022. Gitleaks: a SAST tool for detecting and preventing hardcoded secrets like passwords api keys and tokens in git repositories. https:\/\/blogs.oracle.com\/javamagazine\/post\/java-class-file-constant-pool"},{"key":"e_1_3_2_1_10_1","unstructured":"Martin Blais. 2007. Snakefood. https:\/\/furius.ca\/snakefood\/doc\/snakefood-doc.html \t\t\t\t Martin Blais. 2007. Snakefood. https:\/\/furius.ca\/snakefood\/doc\/snakefood-doc.html"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17524-9_1"},{"key":"e_1_3_2_1_12_1","unstructured":"Justin Collins. 2022. Brakeman: a static vulnerability scanner specifically designed for Ruby on Rails applications. https:\/\/brakemanscanner.org\/ \t\t\t\t Justin Collins. 2022. Brakeman: a static vulnerability scanner specifically designed for Ruby on Rails applications. https:\/\/brakemanscanner.org\/"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_45"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i1.16079"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092705"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473934"},{"key":"e_1_3_2_1_17_1","unstructured":"Martin DeMello etal. 2017. Importlab. https:\/\/github.com\/google\/importlab \t\t\t\t Martin DeMello et al.. 2017. Importlab. https:\/\/github.com\/google\/importlab"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512558"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-06019-0_10"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106261"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111542.1111567"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11560548_12"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.1997.614960"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328438.1328464"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3104155"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473915"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996867"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.10.016"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/STC.2017.8234450"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37051-9_4"},{"volume-title":"Knapsack problems: algorithms and computer implementations","author":"Martello Silvano","key":"e_1_3_2_1_32_1","unstructured":"Silvano Martello and Paolo Toth . 1990. Knapsack problems: algorithms and computer implementations . John Wiley & Sons, Inc. . Silvano Martello and Paolo Toth. 1990. Knapsack problems: algorithms and computer implementations. John Wiley & Sons, Inc.."},{"key":"e_1_3_2_1_33_1","unstructured":"Maven. 2022. List of Maven Packages. https:\/\/gist.github.com\/linghuiluo\/1b82866051e4c4ebb0fd065549f60100 \t\t\t\t Maven. 2022. List of Maven Packages. https:\/\/gist.github.com\/linghuiluo\/1b82866051e4c4ebb0fd065549f60100"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.61"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869495"},{"key":"e_1_3_2_1_36_1","unstructured":"Meta. 2022. Infer: a static analysis platform for Java C and Objective-C. https:\/\/fbinfer.com\/docs\/about-Infer \t\t\t\t Meta. 2022. Infer: a static analysis platform for Java C and Objective-C. https:\/\/fbinfer.com\/docs\/about-Infer"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810310"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070515"},{"key":"e_1_3_2_1_39_1","unstructured":"NIST. 2022. Juliet Test Suite for Java. https:\/\/samate.nist.gov\/SRD\/testsuite.php \t\t\t\t NIST. 2022. Juliet Test Suite for Java. https:\/\/samate.nist.gov\/SRD\/testsuite.php"},{"key":"e_1_3_2_1_40_1","unstructured":"Oracle. 2022. JDeps - Java Platform Standard Edition Tools Reference. https:\/\/docs.oracle.com\/javase\/9\/tools\/jdeps.htm \t\t\t\t Oracle. 2022. JDeps - Java Platform Standard Edition Tools Reference. https:\/\/docs.oracle.com\/javase\/9\/tools\/jdeps.htm"},{"key":"e_1_3_2_1_41_1","unstructured":"OWASP. 2022. FindSecBugs: the SpotBugs plugin for security audits of Java web applications. https:\/\/find-sec-bugs.github.io\/ \t\t\t\t OWASP. 2022. FindSecBugs: the SpotBugs plugin for security audits of Java web applications. https:\/\/find-sec-bugs.github.io\/"},{"key":"e_1_3_2_1_42_1","unstructured":"OWASP. 2022. OWASP. https:\/\/owasp.org\/www-project-benchmark\/ \t\t\t\t OWASP. 2022. OWASP. https:\/\/owasp.org\/www-project-benchmark\/"},{"key":"e_1_3_2_1_43_1","unstructured":"Praetorian Inc.. 2021. Gokart: a security-oriented static analysis for Golang with a focus on minimizing false positives. https:\/\/github.com\/praetorian-inc\/gokart\/ \t\t\t\t Praetorian Inc.. 2021. Gokart: a security-oriented static analysis for Golang with a focus on minimizing false positives. https:\/\/github.com\/praetorian-inc\/gokart\/"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199462"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/4283.003.0008"},{"key":"e_1_3_2_1_46_1","unstructured":"Zachary Rice. 2018. Understanding the constant pool inside a Java class file. https:\/\/github.com\/zricethezav\/gitleaks\/ \t\t\t\t Zachary Rice. 2018. Understanding the constant pool inside a Java class file. https:\/\/github.com\/zricethezav\/gitleaks\/"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19861-8_11"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78791-4_4"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.76"},{"key":"e_1_3_2_1_50_1","unstructured":"Amazon Web Services. 2022. Elastic Compute Cloud (EC2) Pricing. https:\/\/aws.amazon.com\/ec2\/pricing\/ \t\t\t\t Amazon Web Services. 2022. Elastic Compute Cloud (EC2) Pricing. https:\/\/aws.amazon.com\/ec2\/pricing\/"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009885"},{"key":"e_1_3_2_1_52_1","unstructured":"SonarSource S.A.. 2008. Sonarqube: a Static Application Security Testing (SAST) solution to detect security issues in code review. https:\/\/www.sonarqube.org\/features\/security\/ \t\t\t\t SonarSource S.A.. 2008. Sonarqube: a Static Application Security Testing (SAST) solution to detect security issues in code review. https:\/\/www.sonarqube.org\/features\/security\/"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2014.54"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180251"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM51674.2020.00008"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11957-6_30"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037744"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00590-9_13"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328438.1328464"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2019.00086"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303972"}],"event":{"name":"ESEC\/FSE '22: 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","NUS NUS"],"location":"Singapore Singapore","acronym":"ESEC\/FSE '22"},"container-title":["Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3540250.3558944","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T20:22:17Z","timestamp":1686082937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3540250.3558944"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":60,"alternative-id":["10.1145\/3540250.3558944","10.1145\/3540250"],"URL":"https:\/\/doi.org\/10.1145\/3540250.3558944","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}