2016
DOI: 10.1007/s11633-016-1051-x
|View full text |Cite
|
Sign up to set email alerts
|

Lom: Discovering logic flaws within MongoDB-based web applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…; then use them as the input event streams of the CEP engine; finally, the online shopping risks are identified by the complex event processing platform. Here, according to the typical user malicious behavior patterns [6]- [10], we define the relevant variables, atomic events, and the relevant event patterns in this section.…”
Section: B Definitions Of Complex Event Patternsmentioning
confidence: 99%
See 1 more Smart Citation
“…; then use them as the input event streams of the CEP engine; finally, the online shopping risks are identified by the complex event processing platform. Here, according to the typical user malicious behavior patterns [6]- [10], we define the relevant variables, atomic events, and the relevant event patterns in this section.…”
Section: B Definitions Of Complex Event Patternsmentioning
confidence: 99%
“…For example, while the user identity is legal, he/she can achieve malicious purposes by using API calls, multiple accounts information to achieving alternative attacks, and spoofing identity. Currently, there are many such cases [6]- [10]. Another part of researches focused on secure protocols [11].…”
Section: Introductionmentioning
confidence: 99%
“…As a distributed Web application, online shopping systems are loosely coupled and interactively complex. Despite the third party service providers bridging the gap of trustiness between merchants and users, their involvement complicates the logic flow in the checkout process [9]. Logic flows of online shopping systems allow malicious users to carry out malicious behaviors under legal identities, e.g., purchase products using fabricated payments [10,11].…”
Section: Introductionmentioning
confidence: 99%