Fig. 2From: Recovering user-interactions of Rich Internet Applications through replaying of HTTP tracesScreenshots of an attack scenarioBack to article page