{"id":"https://openalex.org/W2794598728","doi":"https://doi.org/10.1109/msp.2018.1870863","title":"Changing the Game of Software Security","display_name":"Changing the Game of Software Security","publication_year":2018,"publication_date":"2018-03-01","ids":{"openalex":"https://openalex.org/W2794598728","doi":"https://doi.org/10.1109/msp.2018.1870863","mag":"2794598728"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/msp.2018.1870863","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087984415","display_name":"Timothy Vidas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Timothy Vidas","raw_affiliation_strings":["Secureworks"],"affiliations":[{"raw_affiliation_string":"Secureworks","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029451644","display_name":"Per Larsen","orcid":"https://orcid.org/0009-0000-2928-4121"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Per Larsen","raw_affiliation_strings":["Immunant"],"affiliations":[{"raw_affiliation_string":"Immunant","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033661137","display_name":"Hamed Okhravi","orcid":"https://orcid.org/0000-0003-1450-3744"},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hamed Okhravi","raw_affiliation_strings":["MIT Lincoln Laboratory"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079497016","display_name":"Ahmad\u2010Reza Sadeghi","orcid":"https://orcid.org/0000-0001-6833-3598"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"funder","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ahmad-Reza Sadeghi","raw_affiliation_strings":["Technische Universität Darmstadt"],"affiliations":[{"raw_affiliation_string":"Technische Universität Darmstadt","institution_ids":["https://openalex.org/I31512782"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.31,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.663448,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":77,"max":79},"biblio":{"volume":"16","issue":"2","first_page":"10","last_page":"11"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9564,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9564,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9411,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.580712},{"id":"https://openalex.org/keywords/pace","display_name":"Pace","score":0.4691103},{"id":"https://openalex.org/keywords/social-software-engineering","display_name":"Social software engineering","score":0.43827143}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6303063},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.6277366},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5906969},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.580712},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.48100457},{"id":"https://openalex.org/C2777526511","wikidata":"https://www.wikidata.org/wiki/Q691543","display_name":"Pace","level":2,"score":0.4691103},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.44548523},{"id":"https://openalex.org/C182500959","wikidata":"https://www.wikidata.org/wiki/Q7551380","display_name":"Social software engineering","level":5,"score":0.43827143},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.42359728},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.31315595},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.13695657},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.12173456},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/msp.2018.1870863","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.54}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2920815960","https://openalex.org/W2893745940","https://openalex.org/W2186532739","https://openalex.org/W2170778849","https://openalex.org/W2155317219","https://openalex.org/W2141237142","https://openalex.org/W2139199024","https://openalex.org/W2114329470","https://openalex.org/W1954441933","https://openalex.org/W1554095625"],"abstract_inverted_index":{"For":[0],"a":[1],"large":[2],"part":[3],"of":[4,13,28,36,56,78,91,113,123,128,144,153],"the":[5,26,50,76,79,145],"world":[6],"population,":[7],"software":[8,29,47,57,87,130,160],"increasingly":[9],"touches":[10],"all":[11],"aspects":[12,127,152],"life.":[14],"Clearly":[15],"there":[16],"are":[17],"societal":[18],"and":[19,53,81,104],"business":[20],"benefits":[21],"to":[22,39,60,63,74],"be":[23],"gained,":[24],"but":[25],"pervasiveness":[27],"also":[30],"presents":[31,125],"unprecedented":[32],"risk.":[33,66],"The":[34,67,89,135],"lack":[35],"capable":[37],"people":[38],"either":[40],"analyze":[41],"existing":[42],"or":[43],"safely":[44],"create":[45],"new":[46],"paired":[48],"with":[49,150],"sheer":[51],"volume":[52],"accelerating":[54],"pace":[55],"development":[58],"lends":[59],"automated":[61],"approaches":[62,139],"address":[64],"this":[65,92],"Cyber":[68],"Grand":[69],"Challenge":[70],"presented":[71,94],"an":[72],"opportunity":[73],"advance":[75],"state":[77],"art":[80],"science":[82],"in":[83,86],"autonomous":[84,97,129],"reasoning":[85],"security.":[88],"culmination":[90],"contest":[93],"seven":[95],"fully":[96],"systems":[98],"vying":[99],"against":[100],"each":[101],"other":[102],"hacking":[103],"defending":[105],"previously":[106],"unseen":[107],"computer":[108],"software,":[109],"ultimately":[110],"making":[111],"sense":[112],"zero-day":[114],"attacks,":[115],"entirely":[116],"without":[117],"any":[118],"human":[119],"assistance.":[120],"This":[121],"collection":[122],"works":[124],"many":[126,151],"security":[131],"from":[132],"differing":[133],"perspectives.":[134],"authors":[136],"detail":[137],"solution":[138],"as":[140,142],"well":[141],"evidence":[143],"challenges":[146],"that":[147],"remain.":[148],"As":[149],"computing,":[154],"while":[155],"much":[156,162],"has":[157],"been":[158],"accomplished":[159],"security,":[161],"work":[163],"remains.":[164]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2794598728","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-02-24T11:26:56.315690","created_date":"2018-04-06"}