Static Detection of DoS Vulnerabilities in Programs that Use Regular Expressions (Q3303917): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / arXiv ID
 
Property / arXiv ID: 1701.04045 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2769592 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4994938 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4813388 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The essence of command injection attacks in web applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programming Techniques: Regular expression search algorithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analyzing Matching Time Behavior of Backtracking Regular Expression Matchers by Using Ambiguity of NFA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata-based symbolic string analysis for vulnerability detection / rank
 
Normal rank

Latest revision as of 05:18, 23 July 2024

scientific article
Language Label Description Also known as
English
Static Detection of DoS Vulnerabilities in Programs that Use Regular Expressions
scientific article

    Statements

    Static Detection of DoS Vulnerabilities in Programs that Use Regular Expressions (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    5 August 2020
    0 references
    regular expression
    0 references
    input string
    0 references
    abstract domain
    0 references
    security vulnerability
    0 references
    attack pattern
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers