{"id":"https://openalex.org/W4308643064","doi":"https://doi.org/10.1145/3548606.3559340","title":"Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem","display_name":"Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308643064","doi":"https://doi.org/10.1145/3548606.3559340"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3559340","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101419431","display_name":"Feng Xiao","orcid":"https://orcid.org/0000-0001-7604-6468"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Feng Xiao","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044348012","display_name":"Zheng Yang","orcid":"https://orcid.org/0000-0001-8610-9936"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zheng Yang","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007487580","display_name":"Joey Allen","orcid":"https://orcid.org/0000-0002-5503-4123"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joey Allen","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100700745","display_name":"Guangliang Yang","orcid":"https://orcid.org/0000-0003-3244-6376"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangliang Yang","raw_affiliation_strings":["Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102077047","display_name":"Grant Williams","orcid":null},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Grant Williams","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047140382","display_name":"Wenke Lee","orcid":"https://orcid.org/0000-0003-2761-1277"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenke Lee","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.985,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.73606,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":85},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cross-site-scripting","display_name":"Cross-Site Scripting","score":0.966619},{"id":"https://openalex.org/keywords/codebase","display_name":"Codebase","score":0.6712928},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.645441},{"id":"https://openalex.org/keywords/cross-platform","display_name":"Cross-platform","score":0.51746875},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.43989116}],"concepts":[{"id":"https://openalex.org/C39569185","wikidata":"https://www.wikidata.org/wiki/Q371199","display_name":"Cross-site scripting","level":5,"score":0.966619},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.79187965},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7908925},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.6889448},{"id":"https://openalex.org/C51929080","wikidata":"https://www.wikidata.org/wiki/Q2425187","display_name":"Codebase","level":3,"score":0.6712928},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.645441},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6453229},{"id":"https://openalex.org/C92400490","wikidata":"https://www.wikidata.org/wiki/Q174666","display_name":"Cross-platform","level":2,"score":0.51746875},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.4536613},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.43989116},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.41819355},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.39542302},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.39441666},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.35048935},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.20094496},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17819294},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.124007404},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3559340","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.5,"id":"https://metadata.un.org/sdg/16"}],"grants":[{"funder":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency","award_id":"HR00112090031; HR00112190087"},{"funder":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research","award_id":"N00014-19-1-2179; N00014-17-1-2895; N00014-18-1-2662"}],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1991074244","https://openalex.org/W2013825673","https://openalex.org/W2023753091","https://openalex.org/W2101678831","https://openalex.org/W2591793539","https://openalex.org/W2792952820","https://openalex.org/W2800651024","https://openalex.org/W2891060526","https://openalex.org/W2910030222","https://openalex.org/W2970323597","https://openalex.org/W3094180604","https://openalex.org/W3095708133","https://openalex.org/W3110204761","https://openalex.org/W3138855186","https://openalex.org/W3175350495","https://openalex.org/W3187895569","https://openalex.org/W3190536237","https://openalex.org/W3194926883","https://openalex.org/W3204945378"],"related_works":["https://openalex.org/W4308643064","https://openalex.org/W3180404666","https://openalex.org/W2907490423","https://openalex.org/W2907218437","https://openalex.org/W2548409577","https://openalex.org/W2407701912","https://openalex.org/W2167752994","https://openalex.org/W2117221897","https://openalex.org/W1531015913","https://openalex.org/W1484631816"],"abstract_inverted_index":{"JavaScript":[0,21],"cross-platform":[1,14,29,109],"frameworks":[2],"are":[3],"becoming":[4],"increasingly":[5],"popular.":[6],"They":[7],"help":[8],"developers":[9,111],"easily":[10],"and":[11,35,65,94,96,105,112,121],"conveniently":[12],"build":[13],"applications":[15,30],"while":[16],"just":[17],"needing":[18],"only":[19],"one":[20],"codebase.":[22],"Recent":[23],"security":[24,59,68,119],"reports":[25],"showed":[26],"several":[27],"high-profile":[28],"(e.g.,":[31],"Slack,":[32],"Microsoft":[33],"Teams,":[34],"Github":[36],"Atom)":[37],"suffered":[38],"injection":[39],"issues,":[40],"which":[41],"were":[42,102,125],"often":[43],"introduced":[44],"by":[45,116],"Cross-site":[46],"Scripting":[47],"(XSS)":[48],"or":[49],"embedded":[50],"untrusted":[51],"remote":[52,62],"content":[53],"like":[54],"ads.":[55],"These":[56],"injections":[57],"open":[58],"holes":[60],"for":[61],"web":[63],"attackers,":[64],"cause":[66,99],"serious":[67],"risks,":[69],"such":[70],"as":[71,86],"allowing":[72],"injected":[73],"malicious":[74],"code":[75],"to":[76,85],"run":[77],"arbitrary":[78],"local":[79],"executables":[80],"in":[81],"victim":[82],"devices":[83],"(referred":[84],"XRCE":[87,92,101],"attacks).":[88],"However,":[89],"until":[90],"now,":[91],"vectors":[93],"behaviors":[95],"the":[97,108],"root":[98],"of":[100],"rarely":[103],"studied":[104],"understood.":[106],"Although":[107],"framework":[110],"community":[113],"responded":[114],"quickly":[115],"offering":[117],"multiple":[118],"features":[120],"suggestions,":[122],"these":[123],"mitigations":[124],"empirically":[126],"proposed":[127],"with":[128],"unknown":[129],"effectiveness.":[130]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4308643064","counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2024-12-30T00:27:11.269029","created_date":"2022-11-13"}