Cited By
View all- Guo ZKang MVenkatakrishnan VGjomemo RCao YLuo BLiao XXu JKirda ELie D(2024)ReactAppScan: Mining React Application Vulnerabilities via Component GraphProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670331(585-599)Online publication date: 2-Dec-2024
- Tzialla IWang JZhu JPanda AWalfish M(2024)Efficient Auditing of Event-driven Web ApplicationsProceedings of the Nineteenth European Conference on Computer Systems10.1145/3627703.3650089(1208-1224)Online publication date: 22-Apr-2024
- Oz HAcar AAris ATuncay GKharraz AUluagac SChua TNgo CKa-Wei Lee RKumar RLauw H(2024)(In)Security of File Uploads in Node.jsProceedings of the ACM Web Conference 202410.1145/3589334.3645342(1573-1584)Online publication date: 13-May-2024
- Show More Cited By