Detecting Broken Object-Level Authorization Vulnerabilities in Database-Backed ApplicationsPublished in CCS CCF-A, 2024Share on Twitter Facebook LinkedIn Previous Next