Auflistung nach Schlagwort "Vulnerability analysis"
1 - 1 von 1
Treffer pro Seite
Sortieroptionen
- ZeitschriftenartikelOn the misuse of graphical user interface elements to implement security controls(it - Information Technology: Vol. 59, No. 5, 2017) Mulliner, Collin; Robertson, William; Kirda, EnginGUIs are the predominant means by which users interact with modern programs. GUIs contain a number of common visual elements widgets such as buttons, textfields, and lists, and GUIs typically provide the ability to change attributes on these widgets to control their visibility and behavior. While these attributes are extremely useful to provide visual cues to users to guide them through an application's GUI, they can also be misused for purposes they were not intended. In particular, in the context of GUI-based applications that include multiple privilege levels within the application, GUI element attributes may be misused as a mechanism for enforcing access control policies. This work presents a method to detect misuse of user interface elements to implement access control, it is based on our earlier work1 that introduced the vulnerability class the we refer to as GEMs, or instances of GUI element misuse. Using our GEM detection method we discovered unknown vulnerabilities in several applications.