From f0d58874f73729bdc967a9f1ce2954899cb68330 Mon Sep 17 00:00:00 2001 From: Pamela Dyer <pamela.dyer@uconn.edu> Date: Thu, 17 Jun 2021 23:17:45 +0000 Subject: [PATCH] Update Application_examples/Web_Browser_Formal_Security.mp --- Application_examples/Web_Browser_Formal_Security.mp | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/Application_examples/Web_Browser_Formal_Security.mp b/Application_examples/Web_Browser_Formal_Security.mp index d1c969e..86f8c3e 100644 --- a/Application_examples/Web_Browser_Formal_Security.mp +++ b/Application_examples/Web_Browser_Formal_Security.mp @@ -38,7 +38,8 @@ in order to model the vulnerabilities explained in the papers above. how MP can check whether Client's web query may be indirectly affected by Bad Server's Redirect intervention. -==============================================================================*/ +==========================================================*/ + SCHEMA Web_browser /* Response may embed some Request events, -- GitLab