Towards automated discovery of access control vulnerabilities