An Example Research of an Over-AuthorityVulnerability Attack Method
赵川 徐雁飞
Journal of Information Security Research . 2019, (3): 248 -252 .