Slowfuzz: Automated domain-independent detection of algorithmic complexity vulnerabilities

T Petsios, J Zhao, AD Keromytis, S Jana - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
Algorithmic complexity vulnerabilities occur when the worst-case time/space complexity of
an application is significantly higher than the respective average case for particular user …

Freezing the Web: a study of {ReDoS} vulnerabilities in {JavaScript-based} web servers

CA Staicu, M Pradel - … USENIX security symposium (USENIX Security 18 …, 2018 - usenix.org
Regular expression denial of service (ReDoS) is a class of algorithmic complexity attacks
where matching a regular expression against an attacker-provided input takes unexpectedly …

The impact of regular expression denial of service (ReDoS) in practice: an empirical study at the ecosystem scale

JC Davis, CA Coghlan, F Servant, D Lee - … of the 2018 26th ACM joint …, 2018 - dl.acm.org
Regular expressions (regexes) are a popular and powerful means of automatically
manipulating text. Regexes are also an understudied denial of service vector (ReDoS). If a …

Regexes are hard: Decision-making, difficulties, and risks in programming regular expressions

LG Michael, J Donohue, JC Davis… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
Regular expressions (regexes) are a powerful mechanism for solving string-matching
problems. They are supported by all modern programming languages, and have been …

Why aren't regular expressions a lingua franca? an empirical study on the re-use and portability of regular expressions

JC Davis, LG Michael IV, CA Coghlan… - Proceedings of the …, 2019 - dl.acm.org
This paper explores the extent to which regular expressions (regexes) are portable across
programming languages. Many languages offer similar regex syntaxes, and it would be …

ReScue: crafting regular expression DoS attacks

Y Shen, Y Jiang, C Xu, P Yu, X Ma, J Lu - Proceedings of the 33rd ACM …, 2018 - dl.acm.org
Regular expression (regex) with modern extensions is one of the most popular string
processing tools. However, poorly-designed regexes can yield exponentially many matching …

HotFuzz: Discovering algorithmic denial-of-service vulnerabilities through guided micro-fuzzing

W Blair, A Mambretti, S Arshad, M Weissbacher… - arXiv preprint arXiv …, 2020 - arxiv.org
Contemporary fuzz testing techniques focus on identifying memory corruption vulnerabilities
that allow adversaries to achieve either remote code execution or information disclosure …

Tabby: Automated gadget chain detection for java deserialization vulnerabilities

X Chen, B Wang, Z Jin, Y Feng, X Li… - 2023 53rd Annual …, 2023 - ieeexplore.ieee.org
Java is one of the preferred options of modern developers and has become increasingly
more prominent with the prevalence of the open-source culture. Thanks to the serialization …

SurgeProtector: Mitigating temporal algorithmic complexity attacks using adversarial scheduling

N Atre, H Sadok, E Chiang, W Wang… - Proceedings of the ACM …, 2022 - dl.acm.org
Denial-of-Service (DoS) attacks are the bane of public-facing network deployments.
Algorithmic complexity attacks (ACAs) are a class of DoS attacks where an attacker uses a …

Revealer: Detecting and exploiting regular expression denial-of-service vulnerabilities

Y Liu, M Zhang, W Meng - 2021 IEEE Symposium on Security …, 2021 - ieeexplore.ieee.org
Regular expression Denial-of-Service (ReDoS) is a class of algorithmic complexity attacks.
Attackers can craft particular strings to trigger the worst-case super-linear matching time of …