{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:49:19Z","timestamp":1760042959841,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["1633271"],"award-info":[{"award-number":["1633271"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012659","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872339,61472405,61972260,61772347,61836005,61932021"],"award-info":[{"award-number":["61872339,61472405,61972260,61772347,61836005,61932021"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Basic and Applied Basic Research Foundation","award":["2019A1515011577"],"award-info":[{"award-number":["2019A1515011577"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416556","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"659-671","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["FlashRegex"],"prefix":"10.1145","author":[{"given":"Yeting","family":"Li","sequence":"first","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Zhiwu","family":"Xu","sequence":"additional","affiliation":[{"name":"Shenzhen University, Shenzhen, China"}]},{"given":"Jialun","family":"Cao","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"given":"Haiming","family":"Chen","sequence":"additional","affiliation":[{"name":"Academy of Sciences, Beijing, China"}]},{"given":"Tingjian","family":"Ge","sequence":"additional","affiliation":[{"name":"University of Massachusetts"}]},{"given":"Shing-Chi","family":"Cheung","sequence":"additional","affiliation":[{"name":"University of Science and Technology, Hong Kong, China"}]},{"given":"Haoren","family":"Zhao","sequence":"additional","affiliation":[{"name":"Shaanxi Normal University, Xi'an, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings Fifth Workshop on Synthesis, SYNT@CAV 2016","author":"Safeer Ahmad Maaz Bin","year":"2016","unstructured":"Maaz Bin Safeer Ahmad and Alvin Cheung. 2016. Leveraging Parallel Data Processing Frameworks With Verified Lifting. In Proceedings Fifth Workshop on Synthesis, SYNT@CAV 2016, Toronto, Canada, July 17--18, 2016. 67--83."},{"key":"e_1_3_2_1_2_1","unstructured":"Adam Baldwin. 2016. Regular Expression Denial Of Service Affecting Express.js. https:\/\/medium.com\/node-security\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.344"},{"key":"e_1_3_2_1_4_1","volume-title":"Playing Regex Golf With Genetic Programming. In Genetic and Evolutionary Computation Conference, GECCO '14","author":"Bartoli Alberto","year":"2014","unstructured":"Alberto Bartoli, Andrea De Lorenzo, Eric Medvet, and Fabiano Tarlao. 2014. Playing Regex Golf With Genetic Programming. In Genetic and Evolutionary Computation Conference, GECCO '14, Vancouver, BC, Canada, July 12--16, 2014. 1063--1070."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2515587"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.128"},{"key":"e_1_3_2_1_7_1","volume-title":"Learning Deterministic Regular Expressions For The Inference Of Schemas From XML Data. TWEB 4, 4","author":"Bex Geert Jan","year":"2010","unstructured":"Geert Jan Bex, Wouter Gelade, Frank Neven, and Stijn Vansummeren. 2010. Learning Deterministic Regular Expressions For The Inference Of Schemas From XML Data. TWEB 4, 4 (2010), 14:1--14:32."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1735886.1735890"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57273-2_45"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering, ASE 2017","author":"Chapman Carl","year":"2017","unstructured":"Carl Chapman, Peipei Wang, and Kathryn T. Stolee. 2017. Exploring Regular Expression Comprehension. In Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering, ASE 2017, Urbana, IL, USA, October 30 - November 03, 2017. 405--416."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3071178.3071196"},{"key":"e_1_3_2_1_12_1","unstructured":"Russ Cox. 2007. Regular Expression Matching Can Be Simple And Fast (But Is Slow In Java Perl PHP Python Ruby ...). https:\/\/swtch.com\/~rsc\/regexp\/regexp1.html"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106241"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236027"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338909"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_17_1","unstructured":"Erling Ellingsen. 2019. Regex Golf. https:\/\/alf.nu\/RegexGolf"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3172077.3172115"},{"key":"e_1_3_2_1_19_1","unstructured":"Stack Exchange. 2016. Outage Postmortem. http:\/\/stackstatus.net\/post\/147710624694\/outage-postmortem-july-20-2016"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062351"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2008.12.008"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737977"},{"key":"e_1_3_2_1_23_1","unstructured":"Python Software Foundation. 2018. PyPI-The Python Package Index. https:\/\/pypi.org\/"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-014-9559-3"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(78)90562-4"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2017.05.013"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926423"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2011","author":"William","year":"2011","unstructured":"William R. Harris and Sumit Gulwani. 2011. Spreadsheet Table Transformations From Examples. In Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2011, San Jose, CA, USA, June 4--8, 2011. 317--328."},{"key":"e_1_3_2_1_29_1","volume-title":"And Risks In Programming Regular Expressions. In 34th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2019","author":"Louis G.","year":"2019","unstructured":"Louis G. Michael IV, James Donohue, James C. Davis, Dongyoon Lee, and Francisco Servant. 2019. Regexes Are Hard: Decision-Making, Difficulties, And Risks In Programming Regular Expressions. In 34th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2019, San Diego, CA, USA, November 11--15, 2019. 415--426."},{"key":"e_1_3_2_1_30_1","volume-title":"NSS 2013, Madrid, Spain, June 3--4, 2013. Proceedings. 135--148","author":"Kirrage James","year":"2013","unstructured":"James Kirrage, Asiri Rathnayake, and Hayo Thielecke. 2013. Static Analysis For Regular Expression Denial-of-Service Attacks. In Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3--4, 2013. Proceedings. 135--148."},{"key":"e_1_3_2_1_31_1","volume-title":"Human Language Technologies: Conference of the North American","author":"Kushman Nate","year":"2013","unstructured":"Nate Kushman and Regina Barzilay. 2013. Using Semantic Unification To Generate Regular Expressions From Natural Language. In Human Language Technologies: Conference of the North American Chapter of the Association of Computational Linguistics, Proceedings, June 9--14, 2013, Westin Peachtree Plaza Hotel, Atlanta, Georgia, USA. 826--836."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993236.2993244"},{"key":"e_1_3_2_1_33_1","unstructured":"Yunyao Li Rajasekar Krishnamurthy Sriram Raghavan Shivakumar Vaithyanathan and H. V. Jagadish. 2008. Regular Expression Learning For Information Extraction. In 2008 Conference on Empirical Methods in Natural Language Processing EMNLP 2008 Proceedings of the Conference 25--27 October 2008 Honolulu Hawaii USA A meeting of SIGDAT a Special Interest Group of the ACL. 21--30."},{"key":"e_1_3_2_1_34_1","volume-title":"DASFAA 2019, Chiang Mai, Thailand, April 22--25, 2019, Proceedings, Part II. 70--85","author":"Li Yeting","year":"2019","unstructured":"Yeting Li, Xiaolan Zhang, Jialun Cao, Haiming Chen, and Chong Gao. 2019. Learning K-Occurrence Regular Expressions With Interleaving. In Database Systems for Advanced Applications - 24th International Conference, DASFAA 2019, Chiang Mai, Thailand, April 22--25, 2019, Proceedings, Part II. 70--85."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the Global Communications Conference, GLOBECOM 2011","author":"Lin Cheng-Hung","year":"2011","unstructured":"Cheng-Hung Lin, Chen-Hsiung Liu, and Shih-Chieh Chang. 2011. Accelerating Regular Expression Matching Using Hierarchical Parallel Machines On GPU. In Proceedings of the Global Communications Conference, GLOBECOM 2011, 5--9 December 2011, Houston, Texas, USA. IEEE, 1--5."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1197"},{"key":"e_1_3_2_1_37_1","unstructured":"Anders M\u00f8ller. 2017. dk.brics.automaton - Finite-State Automata and Regular Expressions for Java. https:\/\/www.brics.dk\/automaton\/"},{"key":"e_1_3_2_1_38_1","unstructured":"Inc. NPM. 2018. NPM. https:\/\/www.npmjs.com\/"},{"key":"e_1_3_2_1_39_1","volume-title":"OOPSLA","author":"Pan Rong","year":"2019","unstructured":"Rong Pan, Qinheping Hu, Gaowei Xu, and Loris D'Antoni. 2019. Automatic Repair Of Regular Expressions. PACMPL 3, OOPSLA (2019), 139:1--139:29."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1677"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134073"},{"key":"e_1_3_2_1_43_1","volume-title":"Static Analysis For Regular Expression Exponential Runtime Via Substructural Logics. CoRR abs\/1405.7058","author":"Rathnayake Asiri","year":"2014","unstructured":"Asiri Rathnayake and Hayo Thielecke. 2014. Static Analysis For Regular Expression Exponential Runtime Via Substructural Logics. CoRR abs\/1405.7058 (2014)."},{"volume-title":"PAKDD 2018, Melbourne, VIC, Australia, June 3--6, 2018, Proceedings, Part II. 67--79","author":"Rebele Thomas","key":"e_1_3_2_1_44_1","unstructured":"Thomas Rebele, Katerina Tzompanaki, and Fabian M. Suchanek. 2018. Adding Missing Words To Regular Expressions. In Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3--6, 2018, Proceedings, Part II. 67--79."},{"key":"e_1_3_2_1_45_1","unstructured":"RegExLib. 2019. Regular Expression Library. http:\/\/regexlib.com\/"},{"key":"e_1_3_2_1_46_1","volume-title":"Inferring LISP Programs From Examples. In Advance Papers of the Fourth International Joint Conference on Artificial Intelligence","author":"Shaw David E.","year":"1975","unstructured":"David E. Shaw, William R. Swartout, and C. Cordell Green. 1975. Inferring LISP Programs From Examples. In Advance Papers of the Fourth International Joint Conference on Artificial Intelligence, Tbilisi, Georgia, USSR, September 3--8, 1975. 260--267."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238159"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.14778\/2977797.2977807"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.14778\/2212351.2212356"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908102"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 14th Workshop on Formal Techniques for Java-like Programs, FTfJP 2012","author":"Spishak Eric","year":"2012","unstructured":"Eric Spishak, Werner Dietl, and Michael D. Ernst. 2012. A Type System For Regular Expressions. In Proceedings of the 14th Workshop on Formal Techniques for Java-like Programs, FTfJP 2012, Beijing, China, June 12, 2012. 20--26."},{"key":"e_1_3_2_1_52_1","first-page":"222","article-title":"Checking Time Linearity Of Regular Expression Matching Based On Backtracking","volume":"9","author":"Sugiyama Satoshi","year":"2014","unstructured":"Satoshi Sugiyama and Yasuhiko Minamide. 2014. Checking Time Linearity Of Regular Expression Matching Based On Backtracking. Information and Media Technologies 9, 3 (2014), 222--232.","journal-title":"Information and Media Technologies"},{"key":"e_1_3_2_1_53_1","volume-title":"New Tool: SDL Regex Fuzzer. https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2010\/10\/12\/new-tool-sdl-regex-fuzzer","author":"Sullivan Bryan","year":"2010","unstructured":"Bryan Sullivan. 2010. New Tool: SDL Regex Fuzzer. https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2010\/10\/12\/new-tool-sdl-regex-fuzzer"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/363347.363387"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3129416.3129440"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062365"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2984030"},{"key":"e_1_3_2_1_58_1","volume-title":"Watson","author":"Weideman Nicolaas","year":"2016","unstructured":"Nicolaas Weideman, Brink van der Merwe, Martin Berglund, and Bruce W. Watson. 2016. Analyzing Matching Time Behavior Of Backtracking Regular Expression Matchers By Using Ambiguity Of NFA. In Implementation and Application of Automata - 21st International Conference, CIAA 2016, Seoul, South Korea, July 19--22, 2016, Proceedings. 322--334."},{"key":"e_1_3_2_1_59_1","volume-title":"TACAS 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22--29, 2017, Proceedings, Part II. 3--20","author":"W\u00fcstholz Valentin","year":"2017","unstructured":"Valentin W\u00fcstholz, Oswaldo Olivo, Marijn J. H. Heule, and Isil Dillig. 2017. Static Detection Of DoS Vulnerabilities In Programs That Use Regular Expressions. In Tools and Algorithms for the Construction and Analysis of Systems - 23rd International Conference, TACAS 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22--29, 2017, Proceedings, Part II. 3--20."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908088"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2482767.2482791"},{"key":"e_1_3_2_1_62_1","volume-title":"Automatically Synthesizing SQL Queries From Input-Output Examples. In 2013 28th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2013","author":"Zhang Sai","year":"2013","unstructured":"Sai Zhang and Yuyin Sun. 2013. Automatically Synthesizing SQL Queries From Input-Output Examples. In 2013 28th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2013, Silicon Valley, CA, USA, November 11--15, 2013. 224--234."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1189"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Virtual Event Australia","acronym":"ASE '20"},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416556","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416556","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416556"}},"subtitle":["deducing anti-ReDoS regexes from examples"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":62,"alternative-id":["10.1145\/3324884.3416556","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416556","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}