This repository hosts the case studies for the "Bulwark: Holistic and Verified Security Monitoring of Web Protocols" ESORICS paper.
- The technical report is provided in the docs folder.
- The ideal specifications and the executable monitors generated by Bulwark are provided in the bulwark folder.
- The source code of all vulnerable applications and docker-based deployment scripts to test the monitors are provided in the casestudies-src folder.
- The Overleaf developers aknowledged and fixed the vulnerability in the Google OAuth 2.0 integration. More details, a PoC attack, and the generated monitor can be found here