Login / Signup

Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case.

Supraja BaskaranLianying ZhaoMohammad MannanAmr M. Youssef
Published in: RAID (2023)
Keyphrases
  • database
  • data sets
  • neural network
  • artificial intelligence