Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a novel class of access control vulnerabilities in GUI-based applications called GEMs (GUI element misuse) in this 55-minute Black Hat conference talk. Dive into the classification of different GEMs arising from misuse of widget attributes, and learn about a general algorithm for identifying and confirming their presence in vulnerable applications. Discover GEM Miner, an implementation of GEM analysis for the Windows platform, and see its effectiveness demonstrated through real-world examples of previously unknown access control vulnerabilities in small business and enterprise applications. Gain insights into how common visual elements in graphical user interfaces can be exploited, and understand the importance of proper access control implementation beyond visual cues.

Syllabus

Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces

Taught by

Black Hat

Reviews

Start your review of Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.