{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:34:20Z","timestamp":1755034460906},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/sp46214.2022.9833597","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T15:28:05Z","timestamp":1658935685000},"page":"2060-2077","source":"Crossref","is-referenced-by-count":10,"title":["Repairing DoS Vulnerability of Real-World Regexes"],"prefix":"10.1109","author":[{"given":"Nariyoshi","family":"Chida","sequence":"first","affiliation":[{"name":"NTT Corporation \/ Waseda University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tachio","family":"Terauchi","sequence":"additional","affiliation":[{"name":"Waseda University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238159"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/363347.363387"},{"key":"ref12","first-page":"3","article-title":"Static detection of dos vulnerabilities in programs that use regular expressions","author":"w\u00fcstholz","year":"2017","journal-title":"Proceedings Part II of the 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems - Volume 10206"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2012.11.006"},{"key":"ref37","first-page":"85","author":"karp","year":"1972","journal-title":"Reducibility Among Combinatorial Problems"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38631-2_11"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1007\/978-3-319-40946-7_27","article-title":"Analyzing matching time behavior of backtracking regular expression matchers by using ambiguity of nfa","author":"weideman","year":"2016","journal-title":"Implementation and Application of Automata"},{"journal-title":"Introduction to the Theory of Computation","year":"1997","author":"sipser","key":"ref36"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00047"},{"article-title":"HTML\/XML tag parsing using regex in Java","year":"2011","author":"tiwari","key":"ref30"},{"key":"ref11","first-page":"361","article-title":"Freezing the web: A study of redos vulnerabilities in javascript-based web servers","author":"staicu","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"journal-title":"Regular Expressions Cookbook","year":"2012","author":"goyvaerts","key":"ref33"},{"article-title":"Details of the cloudflare outage on july 2, 2019","year":"2019","author":"graham-cumming","key":"ref10"},{"year":"2021","key":"ref32"},{"article-title":"Regular expression matching can be simple and fast (but is slow in java, perl, php, python, ruby,...)","year":"2007","author":"cox","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931073"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236072"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00062"},{"key":"ref38","first-page":"337","article-title":"Z3: An efficient smt solver","author":"de moura","year":"2008","journal-title":"Proceedings of the Theory and Practice of Software 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems ser TACAS&#x2019;08\/ETAPS&#x2019;08"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjtrans.7.82"},{"key":"ref19","first-page":"291","article-title":"Incremental grammatical inference from positive and negative data using unbiased finite state automata","author":"alquezar","year":"1994","journal-title":"Proceedings of the ACL-02 workshop on Unsupervised lexical acquisition  -"},{"article-title":"The impact of regular expression denial of service (redos) in practice","year":"2018","author":"davis","key":"ref18"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3071178.3071196"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1145\/3324884.3416556","article-title":"FlashRegex: Deducing Anti-ReDoS Regexes from Examples","author":"li","year":"2020","journal-title":"IEEE\/ACM Int Conference on Automated Software Engineering (ASE)"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2016.02.003"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385988"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-012-9389-0"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00032"},{"journal-title":"Mastering Regular Expressions Understand Your Data and Be More Productive","year":"2006","author":"friedl","key":"ref25"},{"year":"2022","key":"ref42"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3093335.2993244"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3129416.3129440"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314645"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3360565"},{"key":"ref43","first-page":"443","article-title":"Why aren&#x2019;t regular expressions a lingua franca? an empirical study on the re-use and portability of regular expressions","author":"davis","year":"2019","journal-title":"Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering ser ESEC\/FSE 2019"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.344"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1997.2695"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-005-0169-1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57273-2_45"},{"article-title":"Regular expression denial of service - redos","year":"2017","author":"weidman","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236027"},{"article-title":"Outage postmortem july 20, 2016","year":"2016","author":"graham-cumming","key":"ref9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931050"},{"key":"ref3","first-page":"1","article-title":"Fast and precise sanitizer analysis with bek","author":"hooimeijer","year":"2011","journal-title":"Proceedings of the 20th USENIX Conference on Security ser SEC&#x2019;11"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3115\/1613715.1613719"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2515587"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.27.422"}],"event":{"name":"2022 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2022,5,22]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833550\/9833558\/09833597.pdf?arnumber=9833597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T18:05:57Z","timestamp":1699466757000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833597\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/sp46214.2022.9833597","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}