Sign in

Finding client-side business flow tampering vulnerabilities.

I Luk KimYunhui ZhengHogun ParkWeihang WangWei YouYousra AaferXiangyu Zhang
Published in: ICSE (2020)
Keyphrases