iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1109/SOSE58276.2023.00019
{"id":"https://openalex.org/W4387005218","doi":"https://doi.org/10.1109/sose58276.2023.00019","title":"A DevOps Approach to the Mitigation of Security Vulnerabilities in Runtime Environments","display_name":"A DevOps Approach to the Mitigation of Security Vulnerabilities in Runtime Environments","publication_year":2023,"publication_date":"2023-07-01","ids":{"openalex":"https://openalex.org/W4387005218","doi":"https://doi.org/10.1109/sose58276.2023.00019"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/sose58276.2023.00019","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050727746","display_name":"Stefan Throner","orcid":null},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Stefan Throner","raw_affiliation_strings":["Karlsruhe Institute of Technology,Research Group Cooperation & Management,Karlsruhe,Germany"],"affiliations":[{"raw_affiliation_string":"Karlsruhe Institute of Technology,Research Group Cooperation & Management,Karlsruhe,Germany","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070488535","display_name":"Sebastian Abeck","orcid":"https://orcid.org/0009-0006-2540-5532"},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sebastian Abeck","raw_affiliation_strings":["Karlsruhe Institute of Technology,Research Group Cooperation & Management,Karlsruhe,Germany"],"affiliations":[{"raw_affiliation_string":"Karlsruhe Institute of Technology,Research Group Cooperation & Management,Karlsruhe,Germany","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040763319","display_name":"Patrick Petrovic","orcid":null},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Patrick Petrovic","raw_affiliation_strings":["Karlsruhe Institute of Technology,Research Group Cooperation & Management,Karlsruhe,Germany"],"affiliations":[{"raw_affiliation_string":"Karlsruhe Institute of Technology,Research Group Cooperation & Management,Karlsruhe,Germany","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042656876","display_name":"H.-P. Hutter","orcid":"https://orcid.org/0000-0002-7852-8572"},"institutions":[],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Heiko H\u00fctter","raw_affiliation_strings":["iC Consult Group, Service Layers GmbH, Essen, Germany"],"affiliations":[{"raw_affiliation_string":"iC Consult Group, Service Layers GmbH, Essen, Germany","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":68},"biblio":{"volume":"24","issue":null,"first_page":"106","last_page":"113"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Language-based Information Flow Security","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Language-based Information Flow Security","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security and Vulnerability Detection","score":0.9927,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Empirical Studies in Software Engineering","score":0.9898,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/devops","display_name":"DevOps","score":0.82507086},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.6471691},{"id":"https://openalex.org/keywords/software-diversity","display_name":"Software Diversity","score":0.583564},{"id":"https://openalex.org/keywords/source-code-analysis","display_name":"Source Code Analysis","score":0.573243},{"id":"https://openalex.org/keywords/software-reliability-modeling","display_name":"Software Reliability Modeling","score":0.559825},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.5547993},{"id":"https://openalex.org/keywords/software-maintenance","display_name":"Software Maintenance","score":0.548499},{"id":"https://openalex.org/keywords/software-defect-prediction","display_name":"Software Defect Prediction","score":0.544851},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.49933338},{"id":"https://openalex.org/keywords/application-security","display_name":"Application security","score":0.4448985},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.42165276}],"concepts":[{"id":"https://openalex.org/C9903902","wikidata":"https://www.wikidata.org/wiki/Q3025536","display_name":"DevOps","level":3,"score":0.82507086},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.758551},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.65285313},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.6471691},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.57729685},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.5547993},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.5386107},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.51242167},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.49933338},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.4448985},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.42719463},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.42165276},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4105961},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.27835295},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.27336827},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.18403986}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/sose58276.2023.00019","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W1423289960","https://openalex.org/W1559498407","https://openalex.org/W2059218484","https://openalex.org/W2128412750","https://openalex.org/W2740295334","https://openalex.org/W2752228602","https://openalex.org/W2767231363","https://openalex.org/W2773120226","https://openalex.org/W2774761221","https://openalex.org/W3005372886","https://openalex.org/W3040158574","https://openalex.org/W3100479002","https://openalex.org/W3118815308","https://openalex.org/W3121596715","https://openalex.org/W3207204380"],"related_works":["https://openalex.org/W4400965451","https://openalex.org/W2767065145","https://openalex.org/W2557302400","https://openalex.org/W2155353733","https://openalex.org/W2152250926","https://openalex.org/W2150933192","https://openalex.org/W2150898695","https://openalex.org/W2146455667","https://openalex.org/W2135191468","https://openalex.org/W125279808"],"abstract_inverted_index":{"External":[0],"sources,":[1],"such":[2],"as":[3],"libraries":[4,65],"and":[5,66,75,127,135],"packages,":[6],"are":[7],"often":[8,30,96],"used":[9],"to":[10,22,42,102],"accelerate":[11],"software":[12,28,80,139],"development.":[13],"Whereas":[14],"in-house":[15],"developed":[16],"code":[17],"is":[18],"frequently":[19],"revised,":[20],"dependencies":[21],"external":[23],"sources":[24],"or":[25],"already":[26],"delivered":[27],"systems":[29,126],"remain":[31],"unchanged":[32],"if":[33],"the":[34,37,48,55,58,70,76,108,129,133,137,150,154,158],"functionality":[35],"fulfills":[36],"requirements.":[38],"This":[39],"can":[40,53],"lead":[41],"vulnerabilities":[43,123,134],"in":[44,83,124,131],"individual":[45,79],"components":[46,67],"of":[47,57,63,72,78,92,105,157],"system":[49],"over":[50],"time,":[51],"which":[52],"compromise":[54],"security":[56,122],"entire":[59],"system.":[60,159],"The":[61],"issue":[62],"outdated":[64],"increases":[68],"with":[69,140],"number":[71,77],"running":[73,125],"environments":[74,152],"modules":[81],"common":[82],"cloud-native":[84],"environments.":[85],"Current":[86],"vulnerability":[87],"scanners":[88],"detect":[89],"a":[90,103,141,146],"variety":[91],"known":[93,121],"vulnerabilities,":[94],"but":[95],"have":[97],"problems":[98],"fixing":[99],"them":[100],"due":[101],"lack":[104],"integration":[106],"into":[107],"developer's":[109],"workflow.":[110],"To":[111],"prevent":[112],"this,":[113],"we":[114],"present":[115],"an":[116],"approach":[117],"that":[118],"automatically":[119],"detects":[120],"supports":[128],"developer":[130],"closing":[132],"re-delivering":[136],"hardened":[138],"DevOps":[142],"approach,":[143],"by":[144],"providing":[145],"feedback":[147],"loop":[148],"from":[149],"operation":[151],"towards":[153],"development":[155],"artifacts":[156]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4387005218","counts_by_year":[],"updated_date":"2024-12-03T11:52:48.429509","created_date":"2023-09-26"}