Login / Signup
Finding client-side business flow tampering vulnerabilities.
I Luk Kim
Yunhui Zheng
Hogun Park
Weihang Wang
Wei You
Yousra Aafer
Xiangyu Zhang
Published in:
ICSE (2020)
Keyphrases
</>
decision making
digital images
business processes
information systems
reverse engineering
business intelligence
business process
real world
electronic commerce
business models
web browser
business environment
authentication scheme
flow analysis
security vulnerabilities