Cited By
View all- Chen YLi YPan ZLu YChen JJi S(2024)URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic TestingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.333588519(1251-1266)Online publication date: 2024
- Wang EChen JXie WWang CGao YWang ZDuan HLiu YWang B(2024)Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00198(239-257)Online publication date: 19-May-2024
- Li PMeng WZhang MWang CLuo C(2024)Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00197(222-238)Online publication date: 19-May-2024
- Show More Cited By