https://dl.acm.org/doi/pdf/10.1145/3377811.3380355

BibTeX

@inproceedings{kim2020finding, title={Finding client-side business flow tampering vulnerabilities}, author={Kim, I Luk and Zheng, Yunhui and Park, Hogun and Wang, Weihang and You, Wei and Aafer, Yousra and Zhang, Xiangyu}, booktitle={Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering}, pages={222—233}, year={2020} }