2021 IEEE Symposium on Security and Privacy (SP) 2021
DOI: 10.1109/sp40001.2021.00032
|View full text |Cite
|
Sign up to set email alerts
|

Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 60 publications
0
14
0
Order By: Relevance
“…Complementary to our efforts here, prior work identifies the presence of ReDoS vulnerabilities in thousands of JavaScript and Python modules (Davis et al 2018;Staicu and Pradel 2018;Davis et al 2021). While the prior work (Davis et al 2018) took a deep dive into a particular type of vulnerability, this work looks more broadly at issues resulting from regular expressions (including ReDoS issues, which were also present in two PRs in our dataset, Section 4.1.3).…”
Section: Related Workmentioning
confidence: 91%
“…Complementary to our efforts here, prior work identifies the presence of ReDoS vulnerabilities in thousands of JavaScript and Python modules (Davis et al 2018;Staicu and Pradel 2018;Davis et al 2021). While the prior work (Davis et al 2018) took a deep dive into a particular type of vulnerability, this work looks more broadly at issues resulting from regular expressions (including ReDoS issues, which were also present in two PRs in our dataset, Section 4.1.3).…”
Section: Related Workmentioning
confidence: 91%
“…Li et al [19] and Pan et al [23] put forward techniques for automatic regex repair based on examples. In [13] the authors introduce a matching algorithm that leverages selective memoization to mitigate ReDoS attacks while supporting advanced regex features. Sophisticated techniques based on GPU matching [20,34] and state-merging algorithms [6] have also been proposed to speedup the matching.…”
Section: Related Workmentioning
confidence: 99%
“…There is an increasing interest in studying the security of Node.js, both in academia and in industry. Most prior work has concentrated on so-called soft-ware supply chain security, i.e., studying security problems that are prevalent in libraries: injections [22,32,44], hidden property abuse [49], prototype pollution [31,32], malicious packages [19,50], running untrusted code [10,47,48], Re-DoS [17,18,33,43], code debloating [28]. There is also initial evidence that these problems in libraries affect websites in production [31,43].…”
Section: Nodejs Ecosystem Securitymentioning
confidence: 99%