Rohini Sulatycki, Eduardo B. Fernández. Two threat patterns that exploit "security misconfiguration" and "sensitive data exposure" vulnerabilities. In Claudius Link, Veli-Pekka Eloranta, editors, Proceedings of the 20th European Conference on Pattern Languages of Programs, EuroPLoP 2015, Kaufbeuren, Germany, July 8-12, 2015. ACM, 2015. [doi]
@inproceedings{SulatyckiF15, title = {Two threat patterns that exploit "security misconfiguration" and "sensitive data exposure" vulnerabilities}, author = {Rohini Sulatycki and Eduardo B. Fernández}, year = {2015}, doi = {10.1145/2855321.2855368}, url = {http://doi.acm.org/10.1145/2855321.2855368}, researchr = {https://researchr.org/publication/SulatyckiF15}, cites = {0}, citedby = {0}, booktitle = {Proceedings of the 20th European Conference on Pattern Languages of Programs, EuroPLoP 2015, Kaufbeuren, Germany, July 8-12, 2015}, editor = {Claudius Link and Veli-Pekka Eloranta}, publisher = {ACM}, isbn = {978-1-4503-3847-9}, }