Improving developers' understanding of regex denial of service tools through anti-patterns and fix strategies

SA Hassan, Z Aamir, D Lee, JC Davis… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Regular expressions are used for diverse purposes, including input validation and firewalls.
Unfortunately, they can also lead to a security vulnerability called ReDoS (Regular …

The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC

E Heftrig, H Schulmann, N Vogel… - Proceedings of the 2024 on …, 2024 - dl.acm.org
Availability is a major concern in the design of DNSSEC. To ensure availability, DNSSEC
follows Postel's Law [RFC1123]:" Be liberal in what you accept, and conservative in what …

In-network probabilistic monitoring primitives under the influence of adversarial network inputs

H SA, KS Kumar, A Majee, A Bedarakota… - Proceedings of the 7th …, 2023 - dl.acm.org
Network management tasks heavily rely on network telemetry data. Programmable data
planes provide novel ways to collect this telemetry data efficiently using probabilistic data …

Defending Hash Tables from Subterfuge with Depth Charge

T Chakraborty, J Saia, M Young - Proceedings of the 25th International …, 2024 - dl.acm.org
We consider the problem of defending a hash table against a Byzantine attacker that is
trying to degrade the performance of query, insertion and deletion operations. Our defense …

KernelSnitch: Side-Channel Attacks on Kernel Data Structures

L Maar, J Juffinger, T Steinbauer… - … 2025: NDSS 2025, 2025 - graz.elsevierpure.com
The sharing of hardware elements, such as caches, is known to introduce microarchitectural
side-channel leakage. One approach to eliminate this leakage is to not share hardware …

Peregrine: ML-based Malicious Traffic Detection for Terabit Networks

JR Amado, F Pereira, D Pissarra, S Signorello… - arXiv preprint arXiv …, 2024 - arxiv.org
Malicious traffic detectors leveraging machine learning (ML), namely those incorporating
deep learning techniques, exhibit impressive detection capabilities across multiple attacks …

Algorithmic Complexity Attacks on Dynamic Learned Indexes

R Yang, EM Kornaropoulos, Y Cheng - arXiv preprint arXiv:2403.12433, 2024 - arxiv.org
Learned Index Structures (LIS) view a sorted index as a model that learns the data
distribution, takes a data element key as input, and outputs the predicted position of the key …

Defending hash tables from algorithmic complexity attacks with resource burning

T Chakraborty, J Saia, M Young - Theoretical Computer Science, 2024 - Elsevier
We consider the problem of defending a hash table against a Byzantine attacker that is
trying to degrade the performance of query, insertion and deletion operations. Our defense …

Runtime Verification for Programmable Switches

A Shukla, K Hudemann, Z Vági… - IEEE/ACM …, 2023 - ieeexplore.ieee.org
We introduce a runtime verification framework for programmable switches that complements
static analysis. To evaluate our approach, we design and develop P6, a runtime verification …

Robust heuristics: attacks and defenses for job size estimation in WSJF systems

E Chiang, N Atre, H Sadok - Proceedings of the SIGCOMM'22 Poster …, 2022 - dl.acm.org
Packet scheduling algorithms control the order in which a system serves network packets,
which can have significant impact on system performance. Many systems rely on Shortest …