This repository hosts the case studies for the Bulwark ESORICS paper submission.
- The ideal specifications and the executable monitors generated by Bulwark are provided in the bulwark folder.
- The source code of all vulnerable applications and docker-based deployment scripts to test the monitors are provided in the casestudies-src folder.
- The Overleaf developers aknowledged and fixed the vulnerability in the Google OAuth 2.0 integration. More details, a PoC attack, and the generated monitor can be found here