Two threat patterns that exploit "security misconfiguration" and "sensitive data exposure" vulnerabilities

Rohini Sulatycki, Eduardo B. Fernández. Two threat patterns that exploit "security misconfiguration" and "sensitive data exposure" vulnerabilities. In Claudius Link, Veli-Pekka Eloranta, editors, Proceedings of the 20th European Conference on Pattern Languages of Programs, EuroPLoP 2015, Kaufbeuren, Germany, July 8-12, 2015. ACM, 2015. [doi]

@inproceedings{SulatyckiF15,
  title = {Two threat patterns that exploit "security misconfiguration" and "sensitive data exposure" vulnerabilities},
  author = {Rohini Sulatycki and Eduardo B. Fernández},
  year = {2015},
  doi = {10.1145/2855321.2855368},
  url = {http://doi.acm.org/10.1145/2855321.2855368},
  researchr = {https://researchr.org/publication/SulatyckiF15},
  cites = {0},
  citedby = {0},
  booktitle = {Proceedings of the 20th European Conference on Pattern Languages of Programs, EuroPLoP  2015, Kaufbeuren, Germany, July 8-12, 2015},
  editor = {Claudius Link and Veli-Pekka Eloranta},
  publisher = {ACM},
  isbn = {978-1-4503-3847-9},
}