File Hijacking Vulnerability: The Elephant in the RoomPublished in NDSS CCF-A, 2024Share on Twitter Facebook LinkedIn Previous Next