Mamouras et al., 2024 - Google Patents
Static Analysis for Checking the Disambiguation Robustness of Regular ExpressionsMamouras et al., 2024
View PDF- Document ID
- 14948736885489243054
- Author
- Mamouras K
- Le Glaunec A
- Li W
- Chattopadhyay A
- Publication year
- Publication venue
- Proceedings of the ACM on Programming Languages
External Links
Snippet
Regular expressions are commonly used for finding and extracting matches from sequence data. Due to the inherent ambiguity of regular expressions, a disambiguation policy must be considered for the match extraction problem, in order to uniquely determine the desired …
- 230000014509 gene expression 0 title abstract description 114
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2705—Parsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2765—Recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30964—Querying
- G06F17/30979—Query processing
- G06F17/30985—Query processing by using string matching techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/75—Structural analysis for program understanding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
- G06F8/41—Compilation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/10—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
- G06F19/22—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology for sequence comparison involving nucleotides or amino acids, e.g. homology search, motif or SNP [Single-Nucleotide Polymorphism] discovery or sequence alignment
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports | |
Shen et al. | ReScue: crafting regular expression DoS attacks | |
US9305116B2 (en) | Dual DFA decomposition for large scale regular expression matching | |
Sekar | An Efficient Black-box Technique for Defeating Web Application Attacks. | |
Lakhotia et al. | A method for detecting obfuscated calls in malicious binaries | |
Turoňová et al. | Regex matching with counting-set automata | |
Liu et al. | Stochastic optimization of program obfuscation | |
Liu et al. | Revealer: Detecting and exploiting regular expression denial-of-service vulnerabilities | |
Nawaz et al. | MalSPM: Metamorphic malware behavior analysis and classification using sequential pattern mining | |
Lin et al. | Deriving input syntactic structure from execution | |
Le Glaunec et al. | Regular expression matching using bit vector automata | |
Davis et al. | Testing regex generalizability and its implications: A large-scale many-language measurement study | |
Mamouras et al. | Efficient matching of regular expressions with lookaround assertions | |
Ji et al. | Vestige: Identifying binary code provenance for vulnerability detection | |
Mamouras et al. | Static Analysis for Checking the Disambiguation Robustness of Regular Expressions | |
CN115269427A (en) | Intermediate language representation method and system for WEB injection vulnerability | |
Kong et al. | Software-hardware codesign for efficient in-memory regular pattern matching | |
Lin et al. | Reverse engineering input syntactic structure from program execution and its applications | |
Chouchane et al. | Detecting machine-morphed malware variants via engine attribution | |
Eriksson et al. | Black Ostrich: Web application scanning with string solvers | |
Leonov et al. | Top-20 weakest from cybersecurity elements of the Industry production and technology platform 4.0 information systems | |
McLaughlin et al. | Regulator: Dynamic Analysis to Detect {ReDoS} | |
Alam et al. | Droidclone: Attack of the android malware clones-a step towards stopping them | |
Jia et al. | A derivative-based parser generator for visibly Pushdown grammars | |
Zou et al. | Malicious Code Detection in Smart Contracts via Opcode Vectorization |