pith. machine review for the scientific record. sign in

arxiv: 1701.04045 · v1 · submitted 2017-01-15 · 💻 cs.CR · cs.FL· cs.PL· cs.SE

Recognition: unknown

Static Detection of DoS Vulnerabilities in Programs that use Regular Expressions (Extended Version)

Authors on Pith no claims yet
classification 💻 cs.CR cs.FLcs.PLcs.SE
keywords regularexpressionvulnerabilitiesvulnerablealgorithmalgorithmicapproachattack
0
0 comments X
read the original abstract

In an algorithmic complexity attack, a malicious party takes advantage of the worst-case behavior of an algorithm to cause denial-of-service. A prominent algorithmic complexity attack is regular expression denial-of-service (ReDoS), in which the attacker exploits a vulnerable regular expression by providing a carefully-crafted input string that triggers worst-case behavior of the matching algorithm. This paper proposes a technique for automatically finding ReDoS vulnerabilities in programs. Specifically, our approach automatically identifies vulnerable regular expressions in the program and determines whether an "evil" input string can be matched against a vulnerable regular expression. We have implemented our proposed approach in a tool called REXPLOITER and found 41 exploitable security vulnerabilities in Java web applications.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.