B. Braun, C. Pollak, and J. Posegga, A Survey on Control-Flow Integrity Means in Web Application Frameworks, p.2013, 2013.
DOI : 10.1007/978-3-642-41488-6_16

R. Paleari, D. Marrone, D. Bruschi, and M. Monga, On Race Vulnerabilities in Web Applications, 2008.
DOI : 10.1007/978-3-540-70542-0_7

J. Grossman, Seven Business Logic Flaws That Put Your Website At Risk. [White Paper], https://www.whitehatsec.com/assets/WP_bizlogic092407.pdf, last accessed 01, p.14

R. Tate, Apple's Worst Security Breach: 114,000 iPad Owners Exposed, p.14

R. Wang, S. Chen, X. Wang, and S. Qadeer, How to Shop for Free Online -- Security Analysis of Cashier-as-a-Service Based Web Stores, 2011 IEEE Symposium on Security and Privacy, 2011.
DOI : 10.1109/SP.2011.26

A. Guha, S. Krishnamurthi, and T. Jim, Using static analysis for Ajax intrusion detection, Proceedings of the 18th international conference on World wide web, WWW '09, 2009.
DOI : 10.1145/1526709.1526785

. Joyent, Inc: Node.js, p.14

I. Kantor, JavaScript Tutorial -Bubbling and capturing, p.14

K. Jayaraman, G. Lewandowski, P. G. Talaga, and S. J. Chapin, Enforcing Request Integrity in Web Applications, In: DBSec, 2010.
DOI : 10.1007/978-3-642-13739-6_15

URL : https://hal.archives-ouvertes.fr/hal-01056686

B. Braun, P. Gemein, H. P. Reiser, and J. Posegga, Control-Flow Integrity in Web Applications, 2013.
DOI : 10.1007/978-3-642-36563-8_1

D. Balzarotti, M. Cova, V. Felmetsger, and G. Vigna, Multi-module vulnerability analysis of web-based applications, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315250

M. Cova, D. Balzarotti, V. Felmetsger, and G. Vigna, Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications, In: RAID, 2007.
DOI : 10.1007/978-3-540-74320-0_4

V. Felmetsger, L. Cavedon, C. Kruegel, and G. Vigna, Toward Automated Detection of Logic Vulnerabilities in Web Applications, 2010.

X. Li and Y. Xue, BLOCK, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, 2011.
DOI : 10.1145/2076732.2076767

URL : https://hal.archives-ouvertes.fr/hal-00922230

M. Balduzzi, C. T. Gimenez, D. Balzarotti, and E. Kirda, Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications, In: NDSS, 2011.

P. Bisht, T. Hinrichs, N. Skrupsky, R. Bobrowicz, and V. N. Venkatakrishnan, No- Tamper: Automatic Blackbox Detection of Parameter Tampering Opportunities in Web Applications, CCS, 2010.

K. Vikram, A. Prateek, and B. Livshits, Ripley, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009.
DOI : 10.1145/1653662.1653685