Regular expression attack technique on ReDoS vulnerability
Số trang: 11
Loại file: pdf
Dung lượng: 387.29 KB
Lượt xem: 20
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Regular expressions, or regexes, have become an integral part of modern software development, seamlessly woven into the fabric of countless applications. This paper explores the inherent ambiguity of regular expressions, fuzzing with static analysis and proposes a novel fuzzing technique to generate effective attack patterns.
Nội dung trích xuất từ tài liệu:
Regular expression attack technique on ReDoS vulnerability
Nội dung trích xuất từ tài liệu:
Regular expression attack technique on ReDoS vulnerability
Tìm kiếm theo từ khóa liên quan:
Information security Regular expressions Regular expression attack technique ReDoS vulnerability Ambiguous regex constructsTài liệu có liên quan:
-
Ebook Managing risk and information security: Protect to enable - Part 2
102 trang 284 0 0 -
Lecture Business driven information systems (4/e): Chapter 4 - Paige Baltzan
46 trang 56 0 0 -
Ebook The InfoSec handbook: An introduction to Information security - Part 2
193 trang 42 0 0 -
Speeding up data processing on firewall using FPGA
10 trang 42 0 0 -
Ebook The InfoSec handbook: An introduction to Information security - Part 1
183 trang 39 0 0 -
Lecture Professional Practices in IT: Lecture 29
12 trang 38 0 0 -
Ebook PGP & GPG email for the practical paranoid
216 trang 38 0 0 -
Ebook Teach yourself Unix in 24 hours: Part 1
254 trang 38 0 0 -
Ebook Principles of information security (Fifth Edition): Part 1
326 trang 36 0 0 -
Ebok Mathematical foundation of computer science: Part 2
210 trang 34 0 0