GUI testing wiki

      • blockchain
      • bootloader
      • browser fingerprinting
      • cache poisoning
      • CART (classification and regression test)
      • compatibility or conversion testing
      • configuration testing
      • confirmation bias
      • context isolation bypass
      • CORP (Cross-Origin Resource Policy)
      • cryptomining
      • direct manipulation (design pattern)
      • EDG (Event Dependency Graph)
      • EDoS (Economical Denial of Sustainability)
      • ELET (Embedded Language Encapsulation Type)
      • energy-based algorithm
      • ESI (Edge Side Includes)
      • Gecko engine
      • Gherkin
      • gradient boosting
      • HMM (Hidden Markov Model)
      • installation testing
      • Jenkins
      • kernel
      • LIFO (last in, first out)
      • LLM (large language model)
      • machine learning
      • man-in-the-middle attacks
      • micro-service architecture
      • Moving Target Defence
      • MTTR (Mean Time To Recover)
      • MVW (model-view-controller)
      • NCD (Normalized Compression Distance)
      • NFA (Nondeterministic Finite Automation)
      • OAuth
      • OCR (optical character recognition)
      • overfitting
      • PCA (Principal Component Analysis)
      • performance testing
      • Pitest
      • precise alias analysis
      • procedure testing
      • program slicing
      • Q-learning
      • recommendation engine
      • recovery testing
      • reflection (Java)
      • relational databases
      • reliability testing
      • RNN (recurrent neural network)
      • serviceability or maintenance testing
      • signature forgery
      • smuggling
      • social engineering
      • SSL (secure sockets layer)
      • SSRF (server-side request forgery)
      • standard graph matching
      • storage testing
      • stress testing
      • SVM (support vector machine)
      • TDD (test-driven development)
      • TLS (transport layer security)
      • tree difference algorithms
      • VM (virtual machine)
      • volume testing
      • ABAC (attribute based access control)
      • acceptance testing
      • access control
      • Acunetix
      • ad hoc widgets
      • Adobe Flash
      • agile development
      • AIF (Application Independent Functionalities)
      • Alloy modeling language
      • applet
      • AST (Abstract Syntax Tree)
      • authentication vulnerabilities
      • behavioral biometrics analysis
      • benchmark testing
      • BFT (business flow tampering)
      • black-box testing
      • boundary value analysis
      • BRF (Balance Random Forest)
      • brute forcing
      • buffer overflow
      • Burp Suite
      • C2C (client-to-client) communication
      • CA (covering array)
      • callee
      • callstack
      • canvas DOM element
      • CAPTCHA (Completely Automated Public Turing-test-to-tell Computers and Humans Apart)
      • cause-effect graphing
      • CDN (Content Delivery Network)
      • CDP (Chrome DevTools Protocol)
      • CFG (Control Flow Graph)
      • Cisco RBAC CVE
      • clickjacking
      • Co-clustering
      • co-evolving systems
      • code inspection
      • code obfuscation
      • code walkthrough
      • CodeCommons
      • COEP (Cross-Origin Embedder Policy)
      • COIL (Cross-Origin Image Leak)
      • combinatorial testing
      • compiler
      • concolic execution
      • content spoofing
      • cookie
      • COOP (Cross-Origin Opener Policy)
      • CORS (Cross-Origin Resource Sharing)
      • coverage criteria
      • cross-domain policies
      • CRUD (Create, Read, Update, Delete) operations
      • CSP (Content Security Policy)
      • CSRF (cross-site request forgery)
      • CSRF (cross-site request forgery) token
      • CSRH (Client-Side Request Hijacking)
      • CURL
      • CVE (common vulnerabilities and exposures)
      • daikon engine
      • data integrity
      • DDoS (Distributed Denial of Service)
      • DDT (dependency detection tool)
      • DEAP
      • decision table
      • design pattern
      • desk checking
      • DFS (depth-first search)
      • differential testing
      • direct graph-based logic flow analysis
      • directory traversal (path traversal)
      • Docker
      • Docker Hub
      • Docker Image
      • Dockerfile
      • dogfooding
      • DOM clobbering
      • domain
      • DOS (Denial of Service)
      • drive-by download
      • driver
      • DTA (dynamic taint analysis)
      • dual boot
      • dynamic analysis
      • dynamic invariants
      • E2E (end-to-end) testing
      • EAR (Execution After Redirect)
      • EFG (event flow graph)
      • EIG (event interaction graph)
      • ENV (environment variables)
      • EPM (Equivalence Partitioning Method)
      • error
      • error guessing
      • ESG (event sequence graph)
      • event models comparison
      • evil RegEx (Regular Expression)
      • fault model
      • Firefox extension
      • fitness function
      • flaky test
      • forced browsing
      • format string attack
      • framejacking
      • FSM (finite-state machine)
      • Function Variadicity
      • fuzzing
      • GA (genetic algorithm)
      • GEMs (GUI Element Misuse)
      • graph database
      • GUI (graphical user interface)
      • GUI ripper
      • HAR file
      • Honeypot
      • HPG (Hybrid Property Graph)
      • HSTS (HTTP Strict Transport Security)
      • HTTP eavesdropping
      • HTTP Response Splitting
      • HTTP trace collection
      • HTTPS (HyperText Transfer Protocol Secure
      • IDOR (Insecure Direct Object Reference)
      • IDS and IPS (intrusion detection, intrusion prevention system)
      • iframe injection
      • IIFE (immediately invoked function expression)
      • incremental or integration testing
      • IndexedDB
      • Instrumentation
      • integration testing
      • integration tree
      • Iroh.js
      • JEA (Just-Enough-Access) principle
      • JIT (Just-in-time) principle
      • JSON Hijacking Prevention tokens
      • JSON-LD (linked data)
      • JWT (JSON Web Token)
      • keylogging
      • KNN (K-Nearest Neighbors)
      • KS (Kolmogorov-Smirnov) test
      • Linux distribution
      • LM (word n-gram language model)
      • LoC
      • logic coverage testing
      • logic vulnerability
      • logic workflow bypass
      • LTS (Leaning Toothpick Syndrome)
      • Malai
      • Markov’s chain and clickstream analysis
      • Memento (design pattern)
      • mental model
      • MF (Micro-Frontend) architecture
      • MiTB (man-in-the-browser) attack
      • MiTM (man-in-the-middle) attack
      • Monkey patching
      • mono-event interaction
      • MT (metamorphic testing)
      • multi-event interactions
      • multi-modal fusion
      • multi-modal interactions
      • Mutation testing
      • NAS (Network Attached Storage)
      • negative testing
      • non-incremental (big-bang) unit testing
      • noVNC
      • object storage service
      • OpenID
      • OSV (open source vulnerabilities)
      • OWASP (Open Web Application Security Project)
      • OWASP Top 10 (2021)
      • Parallel programming
      • parameter tampering
      • paywalls
      • PDO
      • peer rating
      • penetration test
      • phishing
      • pixel stealing
      • POLA (Principle Of Least Astonishment)
      • PoLP (principle of least privilege)
      • port
      • positive testing
      • Post-WIMP
      • prefix tree
      • privacy
      • prolog (programming language)
      • prototype pollution
      • prototype pollution gadgets
      • proxy object
      • proxy server
      • PWA (progressive web application)
      • QR-code
      • radians
      • random forest
      • RBAC (role-based access control)
      • RCE (Remote Code Execution)
      • redirect attack
      • ReDos (Regular Expression Denial of Service)
      • RegEx (Regular Expression)
      • regression testing
      • reverse proxy
      • RL (Reinforcement Learning)
      • RSS (RDF Site Summary)
      • SameSite cookie
      • sandbox environment
      • security testing
      • SELinux (Security-Enhanced Linux)
      • session hijacking
      • session puzzling
      • sessions token
      • SH (Software Heritage)
      • sine and cosine
      • sink function
      • SLR (systematic literature review)
      • SOP (Same-Origin Policy)
      • SQL signature
      • SQLIA (SQL injection attack)
      • SSIM (Structural Similarity Index Method)
      • SSRF (Server Side Request Forgery)
      • STA (static taint analysis)
      • standard widgets
      • static analysis
      • static invariants
      • string validation
      • stub
      • subgraph isomorphism
      • supervised learning
      • SUT (system under test)
      • SW (Service Worker)
      • symbolic execution
      • systematic testing
      • tabnabbing
      • taxonomy
      • test amplification
      • test oracle
      • testbed environment
      • timing attack
      • top-level navigation
      • trojan horse
      • typosquatting
      • UIDL (User Interface Description Language)
      • UML (Unified Modeling Language)
      • unit testing
      • URL validation
      • usability testing
      • WAF (web application firewall)
      • web security
      • web server misconfiguration
      • Web Storage API (localStorage, sessionStorage)
      • white-box testing
      • WIMP (windows, icon, menu, pointers)
      • WSH (Web Socket Hijack)
      • WSL (Windows Subsystem for Linux)
      • WW (Web Worker)
      • WW (Web Worker) and SW (Service Worker) comparison
      • XCS (Cross Channel Scripting)
      • XSF (Cross-site Framing)
      • XSS (cross site scripting)
      • XSS and CSFR comparison
      • XXE (XML external entities)
      • zero-day vulnerability
            • 02 Grammar
            • 03 Objects
            • 04 Functions
            • 06 Arrays
            • 09 Style
          • JavaScript, The Good Parts
            • 01-02 Self-assessment test, psychology and economics of software testing
            • 03 Program Inspections, walkthroughs and reviews
            • 04 Test-case Design
            • 05 Module (Unit) Testing
            • 06 Higher-Order Testing
            • 07 Usability (User) Testing
            • 08 Debugging
            • 09 Testing in the Agile Environment
            • 10 Testing Internet Applications
            • 11 Mobile Application Testing
          • The art of software testing
            • 5. Web Application Exploitation with Broken Authentication and Path Traversal
          • The Basic of Web Hacking. Tools and Techniques to Attack the Web
            • 16. Client-Side Attacks
          • Web application security
          • A Supervised Learning Approach to Protect Client Authentication on the Web
          • Reliable protection against session fixation attacks
          • Systematically breaking and fixing OpenID security. Formal analysis, semi-automated empirical evaluation, and practical countermeasures
          • User Profiling Using Sequential Mining Over Web Elements
          • Experimental Security Analysis of Sensitive Data Access by Browser Extensions
          • SandFOX. secure sandboxed and isolated environment for Firefox browser
          • Sentinel. Securing legacy firefox extensions
          • An Empirical Study on Detecting and Fixing Buffer Overflow Bugs
          • A solution for the automated detection of clickjacking attacks
          • Clickjacking. Existing defenses and some novel approaches
          • Frametrapping the framebusting defence
          • ProClick. a framework for testing clickjacking attacks in web applications
          • Security assessment of clickjacking risks in web applications. metrics based approach
          • Tricking Johnny into Granting Web Permissions
          • Vulnerability Analysis of Iframe Attacks on Websites
          • An investigation into possible attacks on HTML5 indexedDB and their prevention
          • Analysis of privacy and security in HTML5 web storage
          • Decrypting IndexedDB in private mode of Gecko-based browsers
          • NoteLocker. Simple Secure Storage Service
          • Security of CORS on LocalStorage
          • The role of HTML5 IndexedDB, the past, present and future
          • How Private is Your Private Cloud. Security Analysis of Cloud Control Interfaces
          • Comparative analysis of web security in open source content management system
          • WAVES. Automatic Synthesis of Client-Side Validation Code for Web Applications
          • Accept All Exploits. Exploring the Security Impact of Cookie Banners
          • Quite a mess in my cookie jar! leveraging machine learning to protect web authentication
          • Cross-Site Framing Attacks
          • A Comparison of Online JavaScript Obfuscators
          • A server and browser transparent CSRF defense for web 2.0 applications
          • Assessment of vulnerabilities of web applications of Bangladesh. A case study of XSS and CSRF
          • Browser protection against cross-site request forgery
          • Client-Side Detection of Cross-Site Request Forgery Attacks
          • CsFire. Transparent client-side mitigation of malicious cross-domain requests
          • CSRF Detection Based on Graph Data Mining
          • Enhancing Web Security. A Comparative Analysis of Machine Learning Models for CSRF Detection
          • Honey, I Cached our Security Tokens Re-usage of Security Tokens in the Wild
          • Mitch. A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities
          • Scenario-Based Cross-Site Request Forgery (CSRF) Attack Simulation
          • The Great Request Robbery. An Empirical Study of Client-side Request Hijacking Vulnerabilities on the Web
          • The state of HTTP declarative security in online banking websites
          • Cross-origin pixel stealing. Timing attacks using CSS filters
          • Managing security vulnerabilities introduced by dependencies in React.js
          • It’s (DOM) Clobbering Time. Attack Techniques, Prevalence, and Defenses
          • Augur. Dynamic Taint Analysis for Asynchronous JavaScript
          • A survey. Cloud hosted website protection using soft computing techniques
          • A Traffic Monitoring and Policy Enforcement Framework for HTTP
          • Cross-domain vulnerabilities over social networks
          • Machine Learning Based Web Application Plugin for Threat Detection and IP Analysis
          • Reining in the web with content security policy
          • Bypass testing of web applications
          • Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation
          • ZigZag. Automatically hardening web applications against client-side validation vulnerabilities
          • Intrusion recovery for database-backed web applications
          • Runtime recovery of web applications under zero-days ReDoS attacks
          • VisibleV8. In-browser Monitoring of JavaScript in the Wild
          • JSON Web Token Penetration Testing on Cookie Storage with CSRF Techniques
          • BFTDETECTOR. Automatic detection of business flow tampering for digital content service
          • BLOCK. a black-box approach for detection of state violation attacks towards web applications
          • DetLogic. A black-box approach for detecting logic vulnerabilities in web applications
          • Finding client-side business flow tampering vulnerabilities
          • From Hindsight to Foresight. Enhancing Design Artifacts for Business Logic Flaw Discovery
          • Hidden GEMS. Automated discovery of Access Control Vulnerabilities in Graphical User Interfaces
          • IVD. Automatic Learning and Enforcement of Authorization Rules in Online Social Networks
          • Keeping out the masses. Understanding the popularity and implications of internet paywalls
          • LogicScope. automatic discovery of logic vulnerabilities within web applications
          • On the misuse of Graphical User Interface elements to implement security controls
          • Patching Logic Vulnerabilities for Web Applications using LogicPatcher
          • Requirements for preventing logic flaws in the authentication procedure of web applications
          • Toward black-box detection of logic flaws in web applications
          • Verification of Web Content Integrity. A new approach to protecting servers against tampering
          • A GUI-based metamorphic testing technique for detecting authentication vulnerabilities in Android mobile apps
          • Mining Android App Usages for Generating Actionable GUI-based Execution Scenarios
          • Do Not Trust the Clouds Easily. The Insecurity of Content Security Policy Based on Object Storage
          • A Novel Approach for Message Authentication to Prevent Parameter Tampering Attack in Web Applications
          • Automating the Detection of Access Control Vulnerabilities in Web Applications
          • No tamper. Automatic black-box detection of parameter tampering opportunities in Web Applications
          • TamperProof. a server-agnostic defense for parameter tampering attacks on web applications
          • WAPTEC. whitebox analysis of web applications for parameter tampering exploit construction
          • (Re)considering the Concept of Literature Review Reproducibility
          • PhishCatcher. Client-Side Defense Against Web Spoofing Attacks Using Machine Learning
          • Apathy, convenience or irrelevance. Identifying conceptual barriers to safeguarding children’s data privacy
          • Automatic program repair
          • A Multivocal Literature Review on Prototype Pollution Vulnerability
          • Detecting prototype pollution for node.js. Vulnerability review and new fuzzing inputs
          • Follow My Flow. Unveiling Client-Side Prototype Pollution Gadgets from One Million Real-World Websites
          • On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications
          • Undefined-oriented Programming. Detecting and Chaining Prototype Pollution Gadgets in Node.js Template Engines for Malicious Consequences
          • Malicious QR-code threats and vulnerability of blockchain
          • EARs in the wild. large-scale analysis of execution after redirect vulnerabilities
          • Fear the EAR. discovering and mitigating execution after redirect vulnerabilities
          • Malicious hidden redirect attack web page detection based on CSS features
          • Confeagle. Automated Analysis of Configuration Vulnerabilities in Web Applications
          • A Survey on Vulnerabilities of Service Workers
          • Categorizing service worker attacks and mitigations
          • The Service Worker Hiding in Your Browser. The Next Web Attack Target.
          • Micro-frontends. Principles, implementations and pitfalls
          • Untangling Spaghetti of Evolutions in Software Histories to Identify Code and Test Co-evolutions
          • A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications
          • Automatically inferring user behavior models in large-scale web applications
          • On model-based testing advanced GUIs
          • Testing is an Event-Centric Activity
          • An effective method for preventing SQL injection attack and session hijacking
          • Minimization of SQL injection in scheduling application development
          • SENTINEL. securing database from logic flaws in web applications
          • SQLIA detection techniques
          • Detecting Tabnabbing Attacks Via An RL-Based Agent
          • NoTabNab. Protection against the “tabnabbing attack”
          • TabShots. client-side detection of tabnabbing attacks
          • A snowballing literature study on test amplification
          • An Empirical Analysis of UI-Based Flaky Tests
          • Augusto. Exploiting popular functionalities for the generation of semantic GUI tests with Oracles
          • AutoInSpec, using missing test coverage to improve specifications in GUIs
          • Coverage criteria for GUI testing
          • Lightweight Static Analysis for GUI testing
          • Mutta. A novel tool for E2E web mutation testing
          • Repairing GUI Test Suites Using a Genetic Algorithm
          • STILE, a tool for optimizing E2E web test scripts parallelization
          • What All the PHUZZ Is About. A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications
          • A taxonomy of testable HTML5 Canvas Issues
          • Classifying and qualifying GUI defects
          • Dirty clicks. A study of the Usability and Security Implications of Click-related Behaviors on the Web
          • Home and away. UI design pattern for supporting end-user security
          • JANUS. Detecting rendering bugs in Web Browsers via Visual Delta Consistency
          • Out of Sight, Out of Mind. UI Design and the Inhibition of Mental Models of Security
          • Demo. Large Scale Analysis on Vulnerability Remediation in Open-Source JavaScript projects
          • Adaptive Web Application Firewall for Multi-Threat Detection
          • A systematic review and taxonomy of web applications threats
          • A Taxonomy of Web Security Vulnerabilities
          • Common vulnerabilities in real world web applications
          • Enhancing Front-End Security. Protecting User Data and Privacy in Web Applications
          • Navigating web application security. A survey of vulnerabilities and detection solutions
          • Security of Web Application. State of the Art
          • Towards a formal foundation of web security
          • Web application attacks
          • XCS. Cross Channel Scripting and its impact on web applications
          • A survey of detection methods for XSS attacks
          • Automated removal of cross site scripting vulnerabilities in web applications
          • mXSS attacks. attacking well-secured web-applications by using innerHTML mutations
          • On Security Issues in Web Applications through Cross Site Scripting (XSS)
          • Scriptless attacks. Stealing the pie without touching the sill
          • WAVE. Black Box Detection of XSS, CSRF and Information Leakage Vulnerabilities
      • (Aditya Sood, Richard Enbody, et al., 2011)
      • (Ahmed, Altamimi, et al., 2023)
      • (Akhawe, Barth, et al., 2010)
      • (Al-Kahla, Shatnawi, Taqieddin, 2021)
      • (Aldrich, Turcotte, et al., 2023)
      • (Amalfitano, Misael, et al., 2025)
      • (Anastasia, Stamatia, 2024)
      • (Arlt, Podelski, Bertolini, et al., 2012)
      • (Asish Kumar Dalai, Saroj Kumar Panigrahy, et al., 2012)
      • (Averin, 2020)
      • (Bai, Wang, Zhu, et al., 2021)
      • (Balduzzi, Egele, et al., 2010)
      • (Bandara, Rathnayake, et al., 2021)
      • (Basu, et al., 2024)
      • (Belli, Beyazit, Memon, 2012)
      • (Ben Jaballah, Kheir, et al., 2016)
      • (Bernard, Debar, et al., 2012)
      • (Bhingarkar, Shah, et al., 2017)
      • (Bisht, Hinrichs, et al., 2011)
      • (Bisht, Hinrichs, Skrupsky, et al., 2010)
      • (Bochmann, Das, Dssouli, 1991)
      • (Bojinov, Bursztein, et al., 2009)
      • (Calzavara, Conti, et al., 2019)
      • (Calzavara, Tolomei, et al., 2014)
      • (Calzavara, Tolomei, et al., 2015)
      • (Chanakya, Spoorthi, et al., 2024)
      • (Chandra, Kim, et al., 2011)
      • (Cheh, Tay, et al., 2022)
      • (Chen, Shi, 2018)
      • (Chinprutthiwong, Vardhan, et al., 2021)
      • (Cho, Kim, et al., 2016)
      • (Cohen, Myra B., et al., 2012)
      • (Cram, 2020)
      • (Crockford, 2008)
      • (D'silva, Vanajakshi, et al., 2017)
      • (Danglot, Vera-Perez, Yu, et al., 2019)
      • (Darmawan, Karim, et al., 2021)
      • (De Ryck, Desmet, et al., 2010)
      • (De Ryck, Nikiforakis, et al., 2013)
      • (Deepa, Thilagam, et al., 2018)
      • (Dilavrec, Khelladi, Blouin, et al., 2021)
      • (Doupe, Boe, et al., 2011)
      • (Eshete, Villafiorita, et al., 2013)
      • (Farah, Shojol, et al., 2016)
      • (Felsch, Heiderich, et al., 2015)
      • (Fonseka, Pashenna, et al., 2023)
      • (Gelernter, Grinstein, et al., 2015)
      • (Goues, Claire, Pradel et al., 2021)
      • (Hakim, 2023)
      • (Hazhirpasand, 2020)
      • (Heiderich, Niemietz, et al., 2012)
      • (Heiderich, Schwenk, et al., 2013)
      • (Hoffman, 2024)
      • (Huang, Cohen, Memon, 2010)
      • (Isatou, Abu Bakar, et al., 2015)
      • (Jeong, Hur, 2022)
      • (Johns, Braun, et al., 2011)
      • (Jueckstock, Kapravelos, et al., 2019)
      • (Kang, Lyu, et al., 2024)
      • (Katulanda, Henaka Arachchi, et al., 2023)
      • (Kaur, Tiwari, 2023)
      • (Keen, 2022)
      • (Khodayari, Barber, et al., 2024)
      • (Khodayari, Pellegrino, 2023)
      • (Kim, Lee, et al., 2024)
      • (Kim, Wang, Kwon, et al., 2023)
      • (Kim, Zheng, Park, et al., 2020)
      • (Kimak, Ellman, et al., 2012)
      • (Kimak, Ellman, et al., 2015)
      • (Klein, Musch, et al., 2022)
      • (Kluban, Mannan, et al., 2024)
      • (Kotcher, Pei, Jumde, et al., 2013)
      • (Kratky, Chuda, 2018)
      • (Krishnaraj, Madaan, et al., 2023)
      • (Le, Huu-Tung, Pham, et al., 2019)
      • (Lelli, Blouin, Baudry, 2015a)
      • (Lelli, Blouin, Baudry, 2015b)
      • (Leotta, Paparella, Ricca, 2024)
      • (Levi, Hazan, et al., 2019)
      • (Li, Xie, 2023)
      • (Li, Xue, et al., 2011)
      • (Li, Xue, et al., 2013)
      • (Li, Yan, et al., 2012)
      • (Linares-Vasquez, White, et al., 2018)
      • (Liu, An, et al., 2024)
      • (Liu, Shen, et al., 2020)
      • (Lv, Shi, et al., 2023)
      • (Macklon, Viggiato, Markos, et al., 2023)
      • (Maes, Heyman, et al., 2009)
      • (Maheshwari, Nayak, et al., 2024)
      • (Malviya, Saurav, et al., 2013)
      • (Mariani, Leonardo, et al., 2018)
      • (Marinescu, Parry, et al., 2017)
      • (Memon, Banerjee, Ishan, et al., 2003)
      • (Memon, Soffa, Mary, Pollack, 2001)
      • (Mohammed, Alkhathami, et al., 2021)
      • (Monshizadeh, Naldurg, et al., 2016)
      • (Mulliner, Robertson, Kirda, 2014)
      • (Mulliner, Robertson, Kirda, 2017)
      • (Muraleedharan, Thomas, et al., 2020)
      • (Myers et al., 2011)
      • (Nayak, Khandelwal, et al., 2024)
      • (Ndiaye, Barais, et al., 2019)
      • (Neef, Kleissner, et al., 2024)
      • (Nidhra, Dondeti, 2012)
      • (Offutt, Wu, Du, 2004)
      • (Olianas, Leotta, Ricca, et al., 2024)
      • (Onarlioglu, Buyukkayhan, et al., 2015)
      • (Onukrane, Skrodelis, et al., 2023)
      • (Papadopoulos, Snyder, et al., 2020)
      • (Patel, Rathod, et al., 2013)
      • (Pauli, 2013)
      • (Payet, Doupe, et al., 2013)
      • (Pelizzi, Sekar, et al., 2011)
      • (Pellegrino, Balzarotti, 2014)
      • (Peng Zhou, Yuhan Gao, et al., 2024)
      • (Ramadan, Osama, et al., 2024)
      • (Rauti, Leppänen, 2018)
      • (Rennhard, Kushnir, et al., 2022)
      • (Romano, Song, et al., 2021)
      • (Sadqi, Maleh, 2022)
      • (Saeedeh Sadat et al., 2022)
      • (Saini, Gaur, et al., 2015)
      • (Saleh, Malkawi, et al., 2024)
      • (Samudio, LaToza, 2022)
      • (Sanchez, 2020)
      • (Selim, Tayeb, et al., 2016)
      • (Sendiang, Polii, et al., 2016)
      • (Shahriar, Devendran, et al., 2013)
      • (Shahriar, Haddad, et al., 2015)
      • (Shahriar, Zulkernine, et al., 2010)
      • (Shar, Tan, et al., 2012)
      • (Sinha, Uppal, et al., 2014)
      • (Skrupsky, Bisht, et al., 2013)
      • (Skrupsky, Monshizadeh, et al., 2012)
      • (Solano, Camacho, et al., 2021)
      • (Soleimani, Hadavi, et al., 2017)
      • (Sood, Enbody, et al., 2011)
      • (Spero, Biddle, 2020)
      • (Spero, Biddle, 2021)
      • (Stamm, Sterne, et al., 2010)
      • (Subramani, Jueckstock, et al., 2021)
      • (Sun, Hawkey, et al., 2012)
      • (Sushma, Jayalakshmi, et al., 2022)
      • (Taibi, Mezzalira, 2022)
      • (Tkachenko et al., 2024)
      • (Trampert, Stock, et al., 2023)
      • (Unlu, Bicakci, et al., 2010)
      • (Upasana Sarmah, D.K. Bhattacharyya, et al., 2018)
      • (Ur Rehman, Nazir, Mustafa, 2017)
      • (Viticchie, Basile, Avancini, et al., 2016)
      • (Watson, 2007)
      • (Wei, Ryder, 2013)
      • (Weissbacher, Robertson, et al., 2015)
      • (West, Pulimood, et al., 2012)
      • (Williams, Vo, et al., 2019)
      • (Xu, Ni, Ming, et al., 2024)
      • (Ye, Zhang, Wang et al., 2016)
      • (Zaris, Gjermundrød, et al., 2014)
      • (Zhou, Zhang, Qian, et al., 2024)
      • (Zhu, 2021)
        • French Course 03-11-2025
        • French Course 03-18-2025
        • French Course 04-01-2025
        • French Course 04-08-2025
        • French Course 04-15-2025
        • French Course 05-13-2025
      • Code Generation
      • DevOps in declarative reconfigurations
      • Ethics in research. How to make your research more visible
      • Exploring the Intersections Between Law, Design and Computer Science in Privacy and Data Protection
      • First steps with Zotero
      • Introduction to Abaca (Inria compute cluster)
      • Supporting Metamodel and code co-evolution
      • Taming Large Language Models
      • The publishing trap
      • Towards Autonomous Test Agent
      • Visual Software QA (Quality Assurance) using VLM (Vision Language Models)
        • Paper list
        • Tags analysis
      • PhD status
      • References analysis
      • Temp_Definition
      • Temp_Literature
      • Temp_Reference
      • Temp_Webinars
    Home

    ❯

    00 Antilibrary

    ❯

    cache poisoning

    cache poisoning


    Graph View

    Backlinks

    • HTTP Response Splitting
    • MiTB (man-in-the-browser) attack

    Created with Quartz v4.4.0 © 2025

    • GitHub
    • Discord Community