Using ML models to detect and stop authorization bypass vulnerabilities | Juan Berner | NULLCON
Talk: Rage against the IDOR’s: Using Machine Learning models to detect and stop authorization bypass vulnerabilities Presentation from the talk: https://bit.ly/JuanBernerPresentation
Abstract: One of the most common vulnerabilities that can be found in web applications is authorization bypass vulnerabilities. These vulnerabilities exploit a lack of authorization controls or bugs in them which would allow unauthorized parties to access user’s data. While many solutions attempt to detect when a …