Login / Signup

Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations.

Wanpeng LiChris J. MitchellThomas M. Chen
Published in: Security Protocols Workshop (2018)
Keyphrases
  • source code
  • efficient implementation
  • database
  • learning environment
  • multi agent systems
  • lower bound
  • error detection
  • error correcting
  • error correcting codes
  • malicious code