Login / Signup

Discovering access-control misconfigurations: new approaches and evaluation methodologies.

Lujo BauerYuan LiangMichael K. ReiterChad Spensky
Published in: CODASPY (2012)
Keyphrases