Cited By
View all- He YGu YSu PSun KZhou YWang ZLi Q(2023)A Systematic Study of Android Non-SDK (Hidden) Service API SecurityIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.316087220:2(1609-1623)Online publication date: 1-Mar-2023
- Faisal Fadlalla FElshoush H(2023)Input Validation Vulnerabilities in Web Applications: Systematic Review, Classification, and Analysis of the Current State-of-the-ArtIEEE Access10.1109/ACCESS.2023.326638511(40128-40161)Online publication date: 2023
- Carboni FConti MDonadel DSciacco M(2023)If You’re Scanning This, It’s Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile AppsApplied Cryptography and Network Security Workshops10.1007/978-3-031-41181-6_30(553-570)Online publication date: 4-Oct-2023
- Show More Cited By