Skip to content

Latest commit

 

History

History
19 lines (19 loc) · 637 Bytes

File metadata and controls

19 lines (19 loc) · 637 Bytes

Incorrect or insufficient assumptions about the higher-order business logic being implemented in the application will lead to differences in expected and actual behavior, which may result in security issues.


Slide Screenshot

0191.jpg


Slide Text

  • Business Logic Application-specific
  • Regs -> Spec
  • Assumptions -> Errors
  • Lack of Rules/Tools
  • Infer Constraints
  • High-Severity
  • Security Implications

References


Tags