Login / Signup
Abusing Hidden Properties to Attack the Node.js Ecosystem.
Feng Xiao
Jianwei Huang
Yichang Xiong
Guangliang Yang
Hong Hu
Guofei Gu
Wenke Lee
Published in:
USENIX Security Symposium (2021)
Keyphrases
</>
directed graph
desirable properties
countermeasures
databases
social networks
structural properties