Login / Signup
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications.
Bowen Xu
Shijie Jia
Jingqiang Lin
Fangyu Zheng
Yuan Ma
Limin Liu
Xiaozhuo Gu
Li Song
Published in:
ESORICS (3) (2023)
Keyphrases
</>
detection method
detection algorithm
automatic detection
smart card
change detection
semi automatic
detection scheme
real time
detection accuracy
fully automatic
data driven
data mining
object detection
detection rate
artificial intelligence
machine learning
encryption scheme