Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces. Mulliner, C., Robertson, W. K., & Kirda, E. In IEEE Symposium on Security and Privacy, pages 149-162, 2014. IEEE Computer Society.
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces. [link]Link  Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces. [link]Paper  bibtex   
@inproceedings{conf/sp/MullinerRK14,
  added-at = {2014-11-24T00:00:00.000+0100},
  author = {Mulliner, Collin and Robertson, William K. and Kirda, Engin},
  biburl = {http://www.bibsonomy.org/bibtex/2183d3c02a9252a19048390ad91941401/dblp},
  booktitle = {IEEE Symposium on Security and Privacy},
  crossref = {conf/sp/2014},
  ee = {http://dx.doi.org/10.1109/SP.2014.17},
  interhash = {da3c6f3dd25da63e776d851d7294da86},
  intrahash = {183d3c02a9252a19048390ad91941401},
  isbn = {978-1-4799-4686-0},
  keywords = {dblp},
  pages = {149-162},
  publisher = {IEEE Computer Society},
  timestamp = {2015-06-19T03:58:34.000+0200},
  title = {Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces.},
  url = {http://dblp.uni-trier.de/db/conf/sp/sp2014.html#MullinerRK14},
  year = 2014
}

Downloads: 0