Learn Backend Development Part-Time, Online
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore an innovative approach to automated discovery of protocol-level evasion vulnerabilities in web applications in this 17-minute IEEE conference talk. Learn about a novel technique that identifies potential security weaknesses by analyzing the bottom layers of web protocols, enabling more effective penetration testing and vulnerability assessment. Gain insights into how this method can help break through security barriers and improve overall web application security.
Syllabus
584 Break the Wall from bottom Automated Discovery of Protocol Level Evasion Vulnerabilities in Web
Taught by
IEEE Symposium on Security and Privacy