Berlin, K., Koren, S., Chin, C.-S., Drake, J. P., Lando-
lin, J. M., and Phil lippy, A. M. (2015). Assem-
bling large genomes with single-molecule sequencing
and locality-sensitive hashing. N ature biotechnology,
33(6):623–630.
Broder, A. Z. (1997). On the resemblance and containment
of documents. In Compression and Complexity of Se-
quences 1997. Proceedings, pages 21–29. IEEE.
Broder, A. Z., Charikar, M., Frieze, A. M., and Mitzenma-
cher, M. (2000). Min-wise independent permutations.
Journal of Computer and System Sciences, 60(3):630–
659.
Choudhary, S ., Dincturk, M. E., Bochmann, G. V., Jourdan,
G.-V., Onut, I. V., and Ionescu, P. (2012). Solving
some modeling challenges when testi ng rich internet
applications for security. In 2012 IEEE Fifth Inter-
national Conference on Software Testing, Verification
and Validation, pages 850–857. IEEE.
Doup´e, A., Cavedon, L., Kruegel, C., and Vigna, G. (2012).
Enemy of t he state: A state-aware black-box web vul-
nerability scanner. In USENIX Security Symposium,
volume 14.
Doup´e, A., Cova, M., and Vigna, G. (2010). Why johnny
can’t pentest: An analysis of black-box web vulnera-
bility scanners. In International Conference on De-
tection of Intrusions and Malware, and Vulnerability
Assessment, pages 111–131. Springer.
Duda, C., Frey, G., Kossmann, D., Matter, R., and Zhou, C.
(2009). Ajax crawl: Making ajax applications sear-
chable. In 2009 IEEE 25th International Conference
on Data Engineering, pages 78–89. IEEE.
elFinder (2016). elfinder. http://elfinder.org/. [Online].
Facebook (2004). Facebook. https://www.facebook.com/.
[Online].
Fandango (2000). Fandango. https://www.fandango.com/.
[Online].
Fard, A. M. and Mesbah, A. (2013). Feedback-directed ex-
ploration of web applications to derive test models. In
ISSRE, volume 13, pages 278–287.
Frey, G. (2007). Indexing ajax web applications. PhD the-
sis, Citeseer.
Garrett, J. J. et al. (2005). Ajax: A new approach to web
applications.
GitHub (2008). Github. https://github.com/. [Online].
Gordeychik, S., Grossman, J., Khera, M., Lantinga, M.,
Wysopal, C., Eng, C. , Shah, S., Lee, L. , Murray, C.,
and Evteev, D. (2010). Web application security sta-
tistics. The Web Application Security Consortium.
IBM Security AppScan (2016). Ibm security app-
scan. https://www.ibm.com/security/application-
security/appscan. [Online].
Indyk, P. and Motwani, R. (1998). Approximate nearest
neighbors: towards removing the curse of dimensio-
nality. In Proceedings of the thirtieth annual ACM
symposium on Theory of computing, pages 604–613.
ACM.
Jaccard, P. (1901). Distribution de la Flore Alpine: dans le
Bassin des dranses et dans quelques r´egions voisines.
Rouge.
Levenshtein, V. I. (1966). Binary codes capable of cor-
recting deletions, insertions and reversals. In Soviet
physics doklady, volume 10, page 707.
Mesbah, A. and Van Deursen, A. (2008). Exposing the
hidden-web induced by ajax. Technical report, Delft
University of Technology, Software Engineering Re-
search G roup.
Moosavi, A., Hooshmand, S., Baghbanzadeh, S., Jourdan,
G.-V., Bochmann, G. V., and Onut, I. V. (2014). Index-
ing rich internet applications using components-based
crawling. In International Conference on Web Engi-
neering, pages 200–217. Springer.
Netflix (1997). Netflix. https://media.netflix.com/. [On-
line].
Nicol, G., Wood, L., Champion, M., and Byrne, S. (2001).
Document object model ( dom) level 3 core specifica-
tion. W3C Working Draft, 13:1–146.
Pellegrino, G ., Tsch¨urtz, C., Bodden, E., and Rossow, C.
(2015). j¨ak: Using dynamic analysis to crawl and
test modern web applications. In International Works-
hop on Recent Advances in Intrusion Detection, pages
295–316. Springer.
Pomik´alek, J. (2011). Removing boilerplate and duplicate
content from web corpora. Disertacnı pr´ace, Masary-
kova univerzita, Fakulta informatiky.
Popic, V. and Batzoglou, S. (2016). Privacy-preserving read
mapping using locality sensitive hashing and secure
kmer voting. bioRxiv, page 046920.
Roest, D., Mesbah, A., and Van Deursen, A. (2010). Re-
gression testing ajax applications: Coping with dyn-
amism. In 2010 Third International Conference on
Software Testing, Verification and Validation, pages
127–136. IEEE.
Tai, K.-C. (1979). The tree-to-tree correction problem.
Journal of the ACM (JACM), 26(3):422–433.
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy