Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces. Mulliner, C., Robertson, W. K., & Kirda, E. In IEEE Symposium on Security and Privacy, pages 149-162, 2014. IEEE Computer Society.
Link
Paper bibtex @inproceedings{conf/sp/MullinerRK14,
added-at = {2014-11-24T00:00:00.000+0100},
author = {Mulliner, Collin and Robertson, William K. and Kirda, Engin},
biburl = {http://www.bibsonomy.org/bibtex/2183d3c02a9252a19048390ad91941401/dblp},
booktitle = {IEEE Symposium on Security and Privacy},
crossref = {conf/sp/2014},
ee = {http://dx.doi.org/10.1109/SP.2014.17},
interhash = {da3c6f3dd25da63e776d851d7294da86},
intrahash = {183d3c02a9252a19048390ad91941401},
isbn = {978-1-4799-4686-0},
keywords = {dblp},
pages = {149-162},
publisher = {IEEE Computer Society},
timestamp = {2015-06-19T03:58:34.000+0200},
title = {Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces.},
url = {http://dblp.uni-trier.de/db/conf/sp/sp2014.html#MullinerRK14},
year = 2014
}
Downloads: 0
{"_id":"jzN474GwsqW4prEBN","bibbaseid":"mulliner-robertson-kirda-hiddengemsautomateddiscoveryofaccesscontrolvulnerabilitiesingraphicaluserinterfaces-2014","downloads":0,"creationDate":"2015-12-10T07:19:20.137Z","title":"Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces.","author_short":["Mulliner, C.","Robertson, W. K.","Kirda, E."],"year":2014,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/Engin Erzin?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2014-11-24T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Mulliner"],"firstnames":["Collin"],"suffixes":[]},{"propositions":[],"lastnames":["Robertson"],"firstnames":["William","K."],"suffixes":[]},{"propositions":[],"lastnames":["Kirda"],"firstnames":["Engin"],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/2183d3c02a9252a19048390ad91941401/dblp","booktitle":"IEEE Symposium on Security and Privacy","crossref":"conf/sp/2014","ee":"http://dx.doi.org/10.1109/SP.2014.17","interhash":"da3c6f3dd25da63e776d851d7294da86","intrahash":"183d3c02a9252a19048390ad91941401","isbn":"978-1-4799-4686-0","keywords":"dblp","pages":"149-162","publisher":"IEEE Computer Society","timestamp":"2015-06-19T03:58:34.000+0200","title":"Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces.","url":"http://dblp.uni-trier.de/db/conf/sp/sp2014.html#MullinerRK14","year":"2014","bibtex":"@inproceedings{conf/sp/MullinerRK14,\n added-at = {2014-11-24T00:00:00.000+0100},\n author = {Mulliner, Collin and Robertson, William K. and Kirda, Engin},\n biburl = {http://www.bibsonomy.org/bibtex/2183d3c02a9252a19048390ad91941401/dblp},\n booktitle = {IEEE Symposium on Security and Privacy},\n crossref = {conf/sp/2014},\n ee = {http://dx.doi.org/10.1109/SP.2014.17},\n interhash = {da3c6f3dd25da63e776d851d7294da86},\n intrahash = {183d3c02a9252a19048390ad91941401},\n isbn = {978-1-4799-4686-0},\n keywords = {dblp},\n pages = {149-162},\n publisher = {IEEE Computer Society},\n timestamp = {2015-06-19T03:58:34.000+0200},\n title = {Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces.},\n url = {http://dblp.uni-trier.de/db/conf/sp/sp2014.html#MullinerRK14},\n year = 2014\n}\n\n","author_short":["Mulliner, C.","Robertson, W. K.","Kirda, E."],"key":"conf/sp/MullinerRK14","id":"conf/sp/MullinerRK14","bibbaseid":"mulliner-robertson-kirda-hiddengemsautomateddiscoveryofaccesscontrolvulnerabilitiesingraphicaluserinterfaces-2014","role":"author","urls":{"Link":"http://dx.doi.org/10.1109/SP.2014.17","Paper":"http://dblp.uni-trier.de/db/conf/sp/sp2014.html#MullinerRK14"},"keyword":["dblp"],"downloads":0},"search_terms":["hidden","gems","automated","discovery","access","control","vulnerabilities","graphical","user","interfaces","mulliner","robertson","kirda"],"keywords":["dblp"],"authorIDs":[],"dataSources":["bJn8naASFAjyqsJYn"]}