Fig. 5From: Recovering user-interactions of Rich Internet Applications through replaying of HTTP tracesDetails of an SQL-Injection attack in D-ForenRIABack to article page