Game-based detection method of broken access control vulnerabilities in Web application
To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities...
Saved in:
Main Authors: | HE Haitao, XU Ke, YANG Shuailin, ZHANG Bing, ZHAO Yuxuan, LI Jiazheng |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2024-06-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024078/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Vulnerability Testing and Analysis on Websites and Web-Based Applications in the XYZ Faculty Environment Using Acunetix Vulnerability
by: Mifthahul Rahmi, et al.
Published: (2024-12-01) -
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
by: S. P. Maniraj, et al.
Published: (2024-12-01) -
Design and implementation of national security vulnerability database
by: ZHANG Yu-qing1, et al.
Published: (2011-01-01) -
Research on key technology of vulnerability threat classification
by: Qi-xu LIU, et al.
Published: (2012-09-01) -
Web Accessibility Status of Open Access Journals in Africa: A 2024 Snapshot
by: Pastor Nso-Mangue, et al.
Published: (2024-12-01)