Anota: Identifying Business Logic Vulnerabilities via Annotation-Based Sanitization. Wang, M., Görz, P., Schilling, J., Hassler, K., Guo, L., Holz, T., & Abbasi, A. CoRR, 2025.
Paper doi bibtex @article{DBLP:journals/corr/abs-2512-20705,
author = {Meng Wang and
Philipp G{\"{o}}rz and
Joschua Schilling and
Keno Hassler and
Liwei Guo and
Thorsten Holz and
Ali Abbasi},
title = {Anota: Identifying Business Logic Vulnerabilities via Annotation-Based
Sanitization},
journal = {CoRR},
volume = {abs/2512.20705},
year = {2025},
url = {https://doi.org/10.48550/arXiv.2512.20705},
doi = {10.48550/ARXIV.2512.20705},
eprinttype = {arXiv},
eprint = {2512.20705},
timestamp = {Mon, 26 Jan 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2512-20705.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"bFWNFqxyaSDEmspwo","bibbaseid":"wang-grz-schilling-hassler-guo-holz-abbasi-anotaidentifyingbusinesslogicvulnerabilitiesviaannotationbasedsanitization-2025","author_short":["Wang, M.","Görz, P.","Schilling, J.","Hassler, K.","Guo, L.","Holz, T.","Abbasi, A."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Meng"],"propositions":[],"lastnames":["Wang"],"suffixes":[]},{"firstnames":["Philipp"],"propositions":[],"lastnames":["Görz"],"suffixes":[]},{"firstnames":["Joschua"],"propositions":[],"lastnames":["Schilling"],"suffixes":[]},{"firstnames":["Keno"],"propositions":[],"lastnames":["Hassler"],"suffixes":[]},{"firstnames":["Liwei"],"propositions":[],"lastnames":["Guo"],"suffixes":[]},{"firstnames":["Thorsten"],"propositions":[],"lastnames":["Holz"],"suffixes":[]},{"firstnames":["Ali"],"propositions":[],"lastnames":["Abbasi"],"suffixes":[]}],"title":"Anota: Identifying Business Logic Vulnerabilities via Annotation-Based Sanitization","journal":"CoRR","volume":"abs/2512.20705","year":"2025","url":"https://doi.org/10.48550/arXiv.2512.20705","doi":"10.48550/ARXIV.2512.20705","eprinttype":"arXiv","eprint":"2512.20705","timestamp":"Mon, 26 Jan 2026 00:00:00 +0100","biburl":"https://dblp.org/rec/journals/corr/abs-2512-20705.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/corr/abs-2512-20705,\n author = {Meng Wang and\n Philipp G{\\\"{o}}rz and\n Joschua Schilling and\n Keno Hassler and\n Liwei Guo and\n Thorsten Holz and\n Ali Abbasi},\n title = {Anota: Identifying Business Logic Vulnerabilities via Annotation-Based\n Sanitization},\n journal = {CoRR},\n volume = {abs/2512.20705},\n year = {2025},\n url = {https://doi.org/10.48550/arXiv.2512.20705},\n doi = {10.48550/ARXIV.2512.20705},\n eprinttype = {arXiv},\n eprint = {2512.20705},\n timestamp = {Mon, 26 Jan 2026 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/corr/abs-2512-20705.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Wang, M.","Görz, P.","Schilling, J.","Hassler, K.","Guo, L.","Holz, T.","Abbasi, A."],"key":"DBLP:journals/corr/abs-2512-20705","id":"DBLP:journals/corr/abs-2512-20705","bibbaseid":"wang-grz-schilling-hassler-guo-holz-abbasi-anotaidentifyingbusinesslogicvulnerabilitiesviaannotationbasedsanitization-2025","role":"author","urls":{"Paper":"https://doi.org/10.48550/arXiv.2512.20705"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/73/2297-2.bib","dataSources":["9RRnqWppvSHbtx7rD"],"keywords":[],"search_terms":["anota","identifying","business","logic","vulnerabilities","via","annotation","based","sanitization","wang","görz","schilling","hassler","guo","holz","abbasi"],"title":"Anota: Identifying Business Logic Vulnerabilities via Annotation-Based Sanitization","year":2025}