2021 IEEE Symposium on Security and Privacy (SP) 2021
DOI: 10.1109/sp40001.2021.00062
|View full text |Cite
|
Sign up to set email alerts
|

Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(15 citation statements)
references
References 29 publications
0
14
0
1
Order By: Relevance
“…Three prevalent types are DNS cache poisoning, DNS spoofing, and DNS ID hijacking. DNS cache poisoning involves manipulating the information stored in the DNS cache, providing incorrect name-to-IP mappings and diverting requests to malicious sites [179]. DNS spoofing entails faking the IP address of a computer to misdirect requests.…”
Section: Figure 13 Replay Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Three prevalent types are DNS cache poisoning, DNS spoofing, and DNS ID hijacking. DNS cache poisoning involves manipulating the information stored in the DNS cache, providing incorrect name-to-IP mappings and diverting requests to malicious sites [179]. DNS spoofing entails faking the IP address of a computer to misdirect requests.…”
Section: Figure 13 Replay Attackmentioning
confidence: 99%
“…The primary objective of malicious personnel is to mimic legitimate and regular traffic as possible, for them to exploit and compromise the application. The most common protocols at the application layer includes the Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol Secure (HTTPS) [32], File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol version 3 (POP3), Internet Message Access Protocol (IMAP) [33], Domain Name System (DNS) [34]- [38] , Simple Network Management Protocol (SNMP), Telnet , and DHCP (Dynamic Host Configuration Protocol (DHCP). HTTPS is commonly employed to ensure the security of data in transit [39]- [41].…”
Section: Introductionmentioning
confidence: 99%
“…Figure 2 illustrates an example of exponential behavior. Many researchers have proposed tools to identify regex-input pairs with worst-case polynomial or exponential behavior [27,30,77,87,89,94,100,101,111,114]. Using the typical Spencer algorithm [97], viz.…”
Section: Regexes and Regex-based Denial Of Servicementioning
confidence: 99%
“…The ReDoS problem has been considered from several perspectives. Theoretically, the properties of problematic regexes under different search models have been established, including both Kleeneregular semantics [89,111,114] and extended semantics [77]. In terms of the supply chain, Davis et al showed that up to 10% of the regexes in open-source modules are problematically ambiguous [45][46][47].…”
Section: Introductionmentioning
confidence: 99%
“…There is an increasing interest in studying the security of Node.js, both in academia and in industry. Most prior work has concentrated on so-called soft-ware supply chain security, i.e., studying security problems that are prevalent in libraries: injections [22,32,44], hidden property abuse [49], prototype pollution [31,32], malicious packages [19,50], running untrusted code [10,47,48], Re-DoS [17,18,33,43], code debloating [28]. There is also initial evidence that these problems in libraries affect websites in production [31,43].…”
Section: Nodejs Ecosystem Securitymentioning
confidence: 99%