Guanchen Li

Learn More
Motivated by the prevalence of OAuth-related vulnerabilities in the wild, large-scale security testing of real-world OAuth 2.0 implementations have received increasing attention lately [31,37,42]. However, these existing works either rely on <i>manual discovery</i> of new vulnerabilities in OAuth 2.0 implementations or perform automated testing for(More)
  • 1