Detecting Missing-Permission-Check Vulnerabilities in Distributed Cloud SystemsPublished in Best Paper Honorable Mention, ACM CCS, CCF-A, 2022Share on Twitter Facebook LinkedIn Previous Next