Regular expression attack technique on ReDoS vulnerability
Số trang: 11
Loại file: pdf
Dung lượng: 387.29 KB
Lượt xem: 15
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Regular expressions, or regexes, have become an integral part of modern software development, seamlessly woven into the fabric of countless applications. This paper explores the inherent ambiguity of regular expressions, fuzzing with static analysis and proposes a novel fuzzing technique to generate effective attack patterns.
Nội dung trích xuất từ tài liệu:
Regular expression attack technique on ReDoS vulnerability
Nội dung trích xuất từ tài liệu:
Regular expression attack technique on ReDoS vulnerability
Tìm kiếm theo từ khóa liên quan:
Information security Regular expressions Regular expression attack technique ReDoS vulnerability Ambiguous regex constructsGợi ý tài liệu liên quan:
-
Ebook Managing risk and information security: Protect to enable - Part 2
102 trang 278 0 0 -
Lecture Business driven information systems (4/e): Chapter 4 - Paige Baltzan
46 trang 49 0 0 -
Speeding up data processing on firewall using FPGA
10 trang 36 0 0 -
Ebook The InfoSec handbook: An introduction to Information security - Part 2
193 trang 34 0 0 -
Ebook PGP & GPG email for the practical paranoid
216 trang 34 0 0 -
Ebook The InfoSec handbook: An introduction to Information security - Part 1
183 trang 33 0 0 -
Lecture Professional Practices in IT: Lecture 29
12 trang 32 0 0 -
Ebok Mathematical foundation of computer science: Part 2
210 trang 31 0 0 -
Ebook Principles of information security (Fifth Edition): Part 1
326 trang 31 0 0 -
20 trang 29 0 0