Finding client-side business flow tampering vulnerabilitiesI. Luk KimYunhui Zhenget al.2020ICSE 2020Conference paper