Zobrazeno 1 - 2
of 2
pro vyhledávání: '"Burmane, Ethan H"'
Autor:
Schorlemmer, Taylor R., Burmane, Ethan H., Kalu, Kelechi G., Torres-Arias, Santiago, Davis, James C.
Software engineers integrate third-party components into their applications. The resulting software supply chain is vulnerable. To reduce the attack surface, we can verify the origin of components (provenance) before adding them. Cryptographic signat
Externí odkaz:
http://arxiv.org/abs/2407.03949
Autor:
Bhuiyan, Masudul Hasan Masud, Çakar, Berk, Burmane, Ethan H, Davis, James C, Staicu, Cristian-Alexandru
Regular expression denial of service (ReDoS) is an asymmetric cyberattack that has become prominent in recent years. This attack exploits the slow worst-case matching time of regular expression (regex) engines. In the past, problematic regular expres
Externí odkaz:
http://arxiv.org/abs/2406.11618