Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces.
Collin MullinerWilliam K. RobertsonEngin KirdaPublished in: IEEE Symposium on Security and Privacy (2014)
Keyphrases
- access control
- automated discovery
- graphical user interfaces
- security mechanisms
- fine grained
- dynamic access control
- user interface
- data security
- knowledge discovery
- visual representation
- security policies
- security model
- access control policies
- information security
- role based access control
- graphical user interface
- security architecture
- access control mechanism
- access control systems
- role assignment
- database security
- security issues
- identity management
- unauthorized access
- network security
- rbac model
- access control models
- role based access control model