{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:22Z","timestamp":1750220542642,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T00:00:00Z","timestamp":1623196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Science and Engineering Research Board, India","award":["SB\/S2\/JCB-043\/2015"],"award-info":[{"award-number":["SB\/S2\/JCB-043\/2015"]}]},{"name":"Google Cloud","award":["70CE-WQBA-9QP4-Y7LE, A9TV-KUL5-9RPC-B556"],"award-info":[{"award-number":["70CE-WQBA-9QP4-Y7LE, A9TV-KUL5-9RPC-B556"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,9]]},"DOI":"10.1145\/3448016.3457252","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T17:22:39Z","timestamp":1624036959000},"page":"912-924","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Shedding Light on Opaque Application Queries"],"prefix":"10.1145","author":[{"given":"Kapil","family":"Khurana","sequence":"first","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]},{"given":"Jayant R.","family":"Haritsa","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. ENKI Blogging App. https:\/\/linproxy.fan.workers.dev:443\/https\/github.com\/xaviershay\/enki  [n.d.]. ENKI Blogging App. https:\/\/linproxy.fan.workers.dev:443\/https\/github.com\/xaviershay\/enki"},{"key":"e_1_3_2_2_2_1","unstructured":"[n.d.]. JOB Benchmark. https:\/\/linproxy.fan.workers.dev:443\/https\/github.com\/gregrahn\/join-order-benchmark  [n.d.]. JOB Benchmark. https:\/\/linproxy.fan.workers.dev:443\/https\/github.com\/gregrahn\/join-order-benchmark"},{"key":"e_1_3_2_2_3_1","unstructured":"[n.d.]. RUBiS Auction Site. https:\/\/linproxy.fan.workers.dev:443\/https\/projects.ow2.org\/view\/rubis  [n.d.]. RUBiS Auction Site. https:\/\/linproxy.fan.workers.dev:443\/https\/projects.ow2.org\/view\/rubis"},{"key":"e_1_3_2_2_4_1","unstructured":"[n.d.]. Software is Fragile. www.softwareheritage.org\/mission\/software-isfragile  [n.d.]. Software is Fragile. www.softwareheritage.org\/mission\/software-isfragile"},{"key":"e_1_3_2_2_5_1","unstructured":"[n.d.]. SQL Shield. www.sql-shield.com  [n.d.]. SQL Shield. www.sql-shield.com"},{"key":"e_1_3_2_2_6_1","unstructured":"[n.d.]. Strings. https:\/\/linproxy.fan.workers.dev:443\/https\/docs.microsoft.com\/en-us\/sysinternals\/downloads\/strings  [n.d.]. Strings. https:\/\/linproxy.fan.workers.dev:443\/https\/docs.microsoft.com\/en-us\/sysinternals\/downloads\/strings"},{"key":"e_1_3_2_2_7_1","unstructured":"[n.d.]. TPC-DS. www.tpc.org\/tpcds\/  [n.d.]. TPC-DS. www.tpc.org\/tpcds\/"},{"key":"e_1_3_2_2_8_1","unstructured":"[n.d.]. TPC-H. www.tpc.org\/tpch\/  [n.d.]. TPC-H. www.tpc.org\/tpch\/"},{"key":"e_1_3_2_2_9_1","unstructured":"[n.d.]. UCI Machine Learning Repository. https:\/\/linproxy.fan.workers.dev:443\/https\/archive.ics.uci.edu\/  [n.d.]. UCI Machine Learning Repository. https:\/\/linproxy.fan.workers.dev:443\/https\/archive.ics.uci.edu\/"},{"key":"e_1_3_2_2_10_1","unstructured":"[n.d.]. UNMASQUE Video. https:\/\/linproxy.fan.workers.dev:443\/https\/dsl.cds.iisc.ac.in\/projects\/HIDDEN\/unmasque. mp4  [n.d.]. UNMASQUE Video. https:\/\/linproxy.fan.workers.dev:443\/https\/dsl.cds.iisc.ac.in\/projects\/HIDDEN\/unmasque. mp4"},{"key":"e_1_3_2_2_11_1","unstructured":"[n.d.]. Wilos Process Orchestration Software. www.openhub.net\/p\/6390  [n.d.]. Wilos Process Orchestration Software. www.openhub.net\/p\/6390"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"A. Bonifati R. Ciucanu and S. Staworko. 2016. Learning Join Queries from User Examples. ACM TODS 40 4 (2016).  A. Bonifati R. Ciucanu and S. Staworko. 2016. Learning Join Queries from User Examples. ACM TODS 40 4 (2016).","DOI":"10.1145\/2818637"},{"volume-title":"Proc. of ICDE Conf.","author":"Chavan M.","key":"e_1_3_2_2_13_1","unstructured":"M. Chavan , R. Guravannavar , K. Ramachandra , and S. Sudarshan . 2011. DBridge: A Program Rewrite Tool for Set-Oriented Query Execution . In Proc. of ICDE Conf. M. Chavan, R. Guravannavar, K. Ramachandra, and S. Sudarshan. 2011. DBridge: A Program Rewrite Tool for Set-Oriented Query Execution. In Proc. of ICDE Conf."},{"volume-title":"Proc. of PLDI Conf.","author":"Cheung A.","key":"e_1_3_2_2_14_1","unstructured":"A. Cheung , A. Solar-Lezama , and S. Madden . 2013. Optimizing Database-Backed Applications with Query Synthesis . In Proc. of PLDI Conf. A. Cheung, A. Solar-Lezama, and S. Madden. 2013. Optimizing Database-Backed Applications with Query Synthesis. In Proc. of PLDI Conf."},{"key":"e_1_3_2_2_15_1","unstructured":"P. da Silva. 2019. SQUARES:A SQL Synthesizer Using Query Reverse Engineering. Master's thesis. https:\/\/linproxy.fan.workers.dev:443\/https\/web.ist.utl.pt\/ist181151\/81151-pedro-silva_dissertacao. pdf  P. da Silva. 2019. SQUARES:A SQL Synthesizer Using Query Reverse Engineering. Master's thesis. https:\/\/linproxy.fan.workers.dev:443\/https\/web.ist.utl.pt\/ist181151\/81151-pedro-silva_dissertacao. pdf"},{"volume-title":"Proc. of SIGMOD Conf.","author":"Kalashnikov D.","key":"e_1_3_2_2_16_1","unstructured":"D. Kalashnikov , L. Lakshmanan , and D. Srivastava . 2018. FastQRE: Fast Query Reverse Engineering . In Proc. of SIGMOD Conf. D. Kalashnikov, L. Lakshmanan, and D. Srivastava. 2018. FastQRE: Fast Query Reverse Engineering. In Proc. of SIGMOD Conf."},{"volume-title":"Proc. of SIGMOD Conf.","author":"Karvounarakis G.","key":"e_1_3_2_2_17_1","unstructured":"G. Karvounarakis , Z. Ives , and V. Tannen . 2010. Querying Data Provenance . In Proc. of SIGMOD Conf. G. Karvounarakis, Z. Ives, and V. Tannen. 2010. Querying Data Provenance. In Proc. of SIGMOD Conf."},{"key":"e_1_3_2_2_18_1","volume":"202","author":"Khurana K.","unstructured":"K. Khurana and J. Haritsa. 202 0. UNMASQUE: A Hidden SQL Query Extractor. PVLDB 13, 12 (2020). K. Khurana and J. Haritsa. 2020. UNMASQUE: A Hidden SQL Query Extractor. PVLDB 13, 12 (2020).","journal-title":"J. Haritsa."},{"key":"e_1_3_2_2_19_1","volume":"202","author":"Khurana K.","unstructured":"K. Khurana and J. Haritsa. 202 1. Opaque Query Extraction. Technical Report. Indian Institute of Science. https:\/\/linproxy.fan.workers.dev:443\/https\/dsl.cds.iisc.ac.in\/publications\/report\/TR\/TR- 2021-02.pdf K. Khurana and J. Haritsa. 2021. Opaque Query Extraction. Technical Report. Indian Institute of Science. https:\/\/linproxy.fan.workers.dev:443\/https\/dsl.cds.iisc.ac.in\/publications\/report\/TR\/TR- 2021-02.pdf","journal-title":"J. Haritsa."},{"key":"e_1_3_2_2_20_1","unstructured":"L. Lazar and E. Erez. 2018. A Deep Dive into Database Attacks [Part I]: SQL Obfuscation. www.imperva.com\/blog\/database-attacks-sql-obfuscation  L. Lazar and E. Erez. 2018. A Deep Dive into Database Attacks [Part I]: SQL Obfuscation. www.imperva.com\/blog\/database-attacks-sql-obfuscation"},{"volume-title":"Proc. of EDBT Conf.","author":"Panev K.","key":"e_1_3_2_2_21_1","unstructured":"K. Panev and S. Michel . 2016. Reverse Engineering Top-k Database Queries with PALEO . In Proc. of EDBT Conf. K. Panev and S. Michel. 2016. Reverse Engineering Top-k Database Queries with PALEO. In Proc. of EDBT Conf."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3186728.3164140"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767876"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"W. Tan M. Zhang H. Elmeleegy and D. Srivastava. 2017. Reverse Engineering Aggregation Queries. PVLDB 10 11 (2017).  W. Tan M. Zhang H. Elmeleegy and D. Srivastava. 2017. Reverse Engineering Aggregation Queries. PVLDB 10 11 (2017).","DOI":"10.14778\/3137628.3137648"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"W. Tan M. Zhang H. Elmeleegy and D. Srivastava. 2018. REGAL+: Reverse Engineering SPJA Queries. PVLDB 11 12 (2018).  W. Tan M. Zhang H. Elmeleegy and D. Srivastava. 2018. REGAL+: Reverse Engineering SPJA Queries. PVLDB 11 12 (2018).","DOI":"10.14778\/3229863.3236240"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Q. Tran C. Chan and S. Parthasarathy. 2014. Query Reverse Engineering. The VLDB Journal 23 5 (2014).  Q. Tran C. Chan and S. Parthasarathy. 2014. Query Reverse Engineering. The VLDB Journal 23 5 (2014).","DOI":"10.1007\/s00778-013-0349-3"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"J. Tuya M. Cabal and C. Riva. 2010. Full predicate coverage for testing SQL database queries. STVR 20 3 (2010).  J. Tuya M. Cabal and C. Riva. 2010. Full predicate coverage for testing SQL database queries. STVR 20 3 (2010).","DOI":"10.1002\/stvr.424"},{"volume-title":"Proc. of PLDI Conf.","author":"Wang C.","key":"e_1_3_2_2_28_1","unstructured":"C. Wang , A. Cheung , and R. Bodik . 2017. Synthesizing Highly Expressive SQL Queries from Input-Output Examples . In Proc. of PLDI Conf. C. Wang, A.Cheung, and R. Bodik. 2017. Synthesizing Highly Expressive SQL Queries from Input-Output Examples. In Proc. of PLDI Conf."},{"key":"e_1_3_2_2_29_1","unstructured":"M.Watson. 2019. View SQL Queries From Your Code With Prefix. www.stackify. com\/view-sql-with-prefix\/  M.Watson. 2019. View SQL Queries From Your Code With Prefix. www.stackify. com\/view-sql-with-prefix\/"},{"volume-title":"Proc. of SIGMOD Conf.","author":"Zhang M.","key":"e_1_3_2_2_30_1","unstructured":"M. Zhang , H. Elmeleegy , C. Procopiuc , and D. Srivastava . 2013. Reverse Engineering Complex Join Queries . In Proc. of SIGMOD Conf. M. Zhang, H. Elmeleegy, C. Procopiuc, and D. Srivastava. 2013. Reverse Engineering Complex Join Queries. In Proc. of SIGMOD Conf."}],"event":{"name":"SIGMOD\/PODS '21: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Virtual Event China","acronym":"SIGMOD\/PODS '21"},"container-title":["Proceedings of the 2021 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3448016.3457252","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3448016.3457252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:06Z","timestamp":1750195686000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3448016.3457252"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,9]]},"references-count":30,"alternative-id":["10.1145\/3448016.3457252","10.1145\/3448016"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/3448016.3457252","relation":{},"subject":[],"published":{"date-parts":[[2021,6,9]]},"assertion":[{"value":"2021-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}