[go: up one dir, main page]

Mamouras et al., 2024 - Google Patents

Static Analysis for Checking the Disambiguation Robustness of Regular Expressions

Mamouras et al., 2024

View PDF
Document ID
14948736885489243054
Author
Mamouras K
Le Glaunec A
Li W
Chattopadhyay A
Publication year
Publication venue
Proceedings of the ACM on Programming Languages

External Links

Snippet

Regular expressions are commonly used for finding and extracting matches from sequence data. Due to the inherent ambiguity of regular expressions, a disambiguation policy must be considered for the match extraction problem, in order to uniquely determine the desired …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/27Automatic analysis, e.g. parsing
    • G06F17/2705Parsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/27Automatic analysis, e.g. parsing
    • G06F17/2765Recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30964Querying
    • G06F17/30979Query processing
    • G06F17/30985Query processing by using string matching techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/75Structural analysis for program understanding
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformations of program code
    • G06F8/41Compilation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3612Software analysis for verifying properties of programs by runtime analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/10Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
    • G06F19/22Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology for sequence comparison involving nucleotides or amino acids, e.g. homology search, motif or SNP [Single-Nucleotide Polymorphism] discovery or sequence alignment

Similar Documents

Publication Publication Date Title
Li et al. AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports
Shen et al. ReScue: crafting regular expression DoS attacks
US9305116B2 (en) Dual DFA decomposition for large scale regular expression matching
Sekar An Efficient Black-box Technique for Defeating Web Application Attacks.
Lakhotia et al. A method for detecting obfuscated calls in malicious binaries
Turoňová et al. Regex matching with counting-set automata
Liu et al. Stochastic optimization of program obfuscation
Liu et al. Revealer: Detecting and exploiting regular expression denial-of-service vulnerabilities
Nawaz et al. MalSPM: Metamorphic malware behavior analysis and classification using sequential pattern mining
Lin et al. Deriving input syntactic structure from execution
Le Glaunec et al. Regular expression matching using bit vector automata
Davis et al. Testing regex generalizability and its implications: A large-scale many-language measurement study
Mamouras et al. Efficient matching of regular expressions with lookaround assertions
Ji et al. Vestige: Identifying binary code provenance for vulnerability detection
Mamouras et al. Static Analysis for Checking the Disambiguation Robustness of Regular Expressions
CN115269427A (en) Intermediate language representation method and system for WEB injection vulnerability
Kong et al. Software-hardware codesign for efficient in-memory regular pattern matching
Lin et al. Reverse engineering input syntactic structure from program execution and its applications
Chouchane et al. Detecting machine-morphed malware variants via engine attribution
Eriksson et al. Black Ostrich: Web application scanning with string solvers
Leonov et al. Top-20 weakest from cybersecurity elements of the Industry production and technology platform 4.0 information systems
McLaughlin et al. Regulator: Dynamic Analysis to Detect {ReDoS}
Alam et al. Droidclone: Attack of the android malware clones-a step towards stopping them
Jia et al. A derivative-based parser generator for visibly Pushdown grammars
Zou et al. Malicious Code Detection in Smart Contracts via Opcode Vectorization