Author of the publication

Mitigating Access Control Vulnerabilities through Interactive Static Analysis.

, , , and . SACMAT, page 199-209. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool., , , , and . IEEE Trans. Software Eng., 45 (9): 877-897 (2019)Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code., , and . SACMAT, page 73-80. ACM, (2016)Interactive support for secure programming education., , and . SIGCSE, page 687-692. ACM, (2013)FAIME: An Object-Oriented Methodology for Application Plug-and-Play., , , , , , and . JOOP, 11 (5): 20-26, 34 (1998)POSTER: Using Unit Testing to Detect Sanitization Flaws., , and . ACM Conference on Computer and Communications Security, page 1659-1661. ACM, (2015)Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs., , , , , , , and . ICCCN, page 1-6. IEEE, (2016)Using Unit Testing to Detect Sanitization Flaws., , and . CoRR, (2018)Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks., , and . IRI, page 73-78. IEEE Systems, Man, and Cybernetics Society, (2007)Using a Practice Oriented Approach to Teach Web Security Course., , , , and . FECS, page 405-409. CSREA Press, (2009)Interactive Code Annotation for Security Vulnerability Detection., , , and . SIW@CCS, page 17-22. ACM, (2014)