{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:21Z","timestamp":1750220241281,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF","award":["CNS-1815495"],"award-info":[{"award-number":["CNS-1815495"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1145\/3545948.3545967","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T11:21:49Z","timestamp":1666005709000},"page":"276-291","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables"],"prefix":"10.1145","author":[{"given":"Nicolaas","family":"Weideman","sequence":"first","affiliation":[{"name":"Information Sciences Institute, University of Southern California, USA"}]},{"given":"Haoda","family":"Wang","sequence":"additional","affiliation":[{"name":"Information Sciences Institute, University of Southern California, USA"}]},{"given":"Tyler","family":"Kann","sequence":"additional","affiliation":[{"name":"Information Sciences Institute, University of Southern California, USA"}]},{"given":"Spencer","family":"Zahabizadeh","sequence":"additional","affiliation":[{"name":"Information Sciences Institute, University of Southern California, USA"}]},{"given":"Wei-Cheng","family":"Wu","sequence":"additional","affiliation":[{"name":"Information Sciences Institute, University of Southern California, USA"}]},{"given":"Rajat","family":"Tandon","sequence":"additional","affiliation":[{"name":"Information Sciences Institute, University of Southern California, USA"}]},{"given":"Jelena","family":"Mirkovic","sequence":"additional","affiliation":[{"name":"Information Sciences Institute, University of Southern California, USA"}]},{"given":"Christophe","family":"Hauser","sequence":"additional","affiliation":[{"name":"Information Sciences Institute, University of Southern California, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Jyrki Alakuijala Bill Cox and Jan Wassenberg. 2016. Fast keyed hash\/pseudo-random function using SIMD multiply and permute. CoRR abs\/1612.06257(2016). arxiv:1612.06257http:\/\/arxiv.org\/abs\/1612.06257  Jyrki Alakuijala Bill Cox and Jan Wassenberg. 2016. Fast keyed hash\/pseudo-random function using SIMD multiply and permute. CoRR abs\/1612.06257(2016). arxiv:1612.06257http:\/\/arxiv.org\/abs\/1612.06257"},{"key":"e_1_3_2_1_2_1","unstructured":"angr. 2016. The Angr binary analysis platform. http:\/\/angr.io.  angr. 2016. The Angr binary analysis platform. http:\/\/angr.io."},{"key":"e_1_3_2_1_3_1","volume-title":"13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07668)","author":"Aumasson Jean-Philippe","year":"2012","unstructured":"Jean-Philippe Aumasson and Daniel\u00a0 J. Bernstein . 2012 . SipHash: A Fast Short-Input PRF. In Progress in Cryptology - INDOCRYPT 2012 , 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07668) , Steven\u00a0D. Galbraith and Mridul Nandi (Eds.). Springer, 489\u2013508. https:\/\/doi.org\/10.1007\/978-3-642-34931-7_28 10.1007\/978-3-642-34931-7_28 Jean-Philippe Aumasson and Daniel\u00a0J. Bernstein. 2012. SipHash: A Fast Short-Input PRF. In Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07668), Steven\u00a0D. Galbraith and Mridul Nandi (Eds.). Springer, 489\u2013508. https:\/\/doi.org\/10.1007\/978-3-642-34931-7_28"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Bao Tiffany","year":"2014","unstructured":"Tiffany Bao , Jonathan Burket , Maverick Woo , Rafael Turner , and David Brumley . 2014 . BYTEWEIGHT: Learning to Recognize Functions in Binary Code . In Proceedings of the 23rd USENIX Security Symposium , San Diego, CA, USA , August 20-22, 2014, Kevin Fu and Jaeyeon Jung (Eds.). USENIX Association, 845\u2013860. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/bao Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, and David Brumley. 2014. BYTEWEIGHT: Learning to Recognize Functions in Binary Code. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014, Kevin Fu and Jaeyeon Jung (Eds.). USENIX Association, 845\u2013860. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/bao"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23300"},{"key":"e_1_3_2_1_6_1","unstructured":"Dan\u00a0J. Bernstein. 2000. CDB. https:\/\/cr.yp.to\/cdb.html.  Dan\u00a0J. Bernstein. 2000. CDB. https:\/\/cr.yp.to\/cdb.html."},{"key":"e_1_3_2_1_7_1","unstructured":"Dan\u00a0J. Bernstein. 2001. DJBDNS. https:\/\/cr.yp.to\/djbdns.html.  Dan\u00a0J. Bernstein. 2001. DJBDNS. https:\/\/cr.yp.to\/djbdns.html."},{"key":"e_1_3_2_1_8_1","unstructured":"Dan\u00a0J. Bernstein. 2003. DJB Hash. http:\/\/www.cse.yorku.ca\/~oz\/hash.html.  Dan\u00a0J. Bernstein. 2003. DJB Hash. http:\/\/www.cse.yorku.ca\/~oz\/hash.html."},{"key":"e_1_3_2_1_9_1","volume-title":"HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020","author":"Blair William","year":"2020","unstructured":"William Blair , Andrea Mambretti , Sajjad Arshad , Michael Weissbacher , William Robertson , Engin Kirda , and Manuel Egele . 2020 . HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020 , San Diego, California, USA , February 23-26, 2020. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/hotfuzz-discovering-algorithmic-denial-of-service-vulnerabilities-through-guided-micro-fuzzing\/ William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, and Manuel Egele. 2020. HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/hotfuzz-discovering-algorithmic-denial-of-service-vulnerabilities-through-guided-micro-fuzzing\/"},{"key":"e_1_3_2_1_10_1","volume-title":"Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings(Lecture Notes in Computer Science, Vol.\u00a04064)","author":"Bruschi Danilo","year":"2006","unstructured":"Danilo Bruschi , Lorenzo Martignoni , and Mattia Monga . 2006 . Detecting Self-mutating Malware Using Control-Flow Graph Matching. In Detection of Intrusions and Malware & Vulnerability Assessment , Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings(Lecture Notes in Computer Science, Vol.\u00a04064) , Roland B\u00fcschkes and Pavel Laskov (Eds.). Springer, 129\u2013143. https:\/\/doi.org\/10.1007\/11790754_8 10.1007\/11790754_8 Danilo Bruschi, Lorenzo Martignoni, and Mattia Monga. 2006. Detecting Self-mutating Malware Using Control-Flow Graph Matching. In Detection of Intrusions and Malware & Vulnerability Assessment, Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings(Lecture Notes in Computer Science, Vol.\u00a04064), Roland B\u00fcschkes and Pavel Laskov (Eds.). Springer, 129\u2013143. https:\/\/doi.org\/10.1007\/11790754_8"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.13"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA","author":"A.","year":"2003","unstructured":"Scott\u00a0 A. Crosby and Dan\u00a0S. Wallach. 2003. Denial of Service via Algorithmic Complexity Attacks . In Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA , August 4-8, 2003 . USENIX Association. https:\/\/www.usenix.org\/conference\/12th-usenix-security-symposium\/denial-service-algorithmic-complexity-attacks Scott\u00a0A. Crosby and Dan\u00a0S. Wallach. 2003. Denial of Service via Algorithmic Complexity Attacks. In Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003. USENIX Association. https:\/\/www.usenix.org\/conference\/12th-usenix-security-symposium\/denial-service-algorithmic-complexity-attacks"},{"key":"e_1_3_2_1_13_1","unstructured":"CVE-2011-4885 2011. CVE-2011-4885.Available from CVE Details CVE-ID CVE-2011-4885.. https:\/\/www.cvedetails.com\/cve\/CVE-2011-4885\/  CVE-2011-4885 2011. CVE-2011-4885.Available from CVE Details CVE-ID CVE-2011-4885.. https:\/\/www.cvedetails.com\/cve\/CVE-2011-4885\/"},{"key":"e_1_3_2_1_14_1","unstructured":"CVE-2012-1150 2012. CVE-2012-1150.Available from National Vulnerability Database CVE-ID CVE-2009-1897.. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2012-1150  CVE-2012-1150 2012. CVE-2012-1150.Available from National Vulnerability Database CVE-ID CVE-2009-1897.. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2012-1150"},{"key":"e_1_3_2_1_15_1","unstructured":"CVE-2012-2739 2012. CVE-2012-1150.Available from National Vulnerability Database CVE-ID CVE-2012-2739.. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2012-2739  CVE-2012-2739 2012. CVE-2012-1150.Available from National Vulnerability Database CVE-ID CVE-2012-2739.. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2012-2739"},{"key":"e_1_3_2_1_16_1","unstructured":"CVE-2021-41168 2021. CVE-2021-41168.Available from National Vulnerability Database CVE-ID CVE-2021-41168.. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-41168  CVE-2021-41168 2021. CVE-2021-41168.Available from National Vulnerability Database CVE-ID CVE-2021-41168.. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-41168"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385972"},{"key":"e_1_3_2_1_18_1","volume-title":"BinClone: Detecting Code Clones in Malware. In Eighth International Conference on Software Security and Reliability, SERE 2014","author":"Farhadi Mohammad\u00a0Reza","year":"2014","unstructured":"Mohammad\u00a0Reza Farhadi , Benjamin C.\u00a0M. Fung , Philippe Charland , and Mourad Debbabi . 2014 . BinClone: Detecting Code Clones in Malware. In Eighth International Conference on Software Security and Reliability, SERE 2014 , San Francisco, California, USA, June 30 - July 2, 2014. IEEE, 78\u201387. https:\/\/doi.org\/10.1109\/SERE.2014.21 10.1109\/SERE.2014.21 Mohammad\u00a0Reza Farhadi, Benjamin C.\u00a0M. Fung, Philippe Charland, and Mourad Debbabi. 2014. BinClone: Detecting Code Clones in Malware. In Eighth International Conference on Software Security and Reliability, SERE 2014, San Francisco, California, USA, June 30 - July 2, 2014. IEEE, 78\u201387. https:\/\/doi.org\/10.1109\/SERE.2014.21"},{"key":"e_1_3_2_1_19_1","volume-title":"Datalog Disassembly. In 29th USENIX Security Symposium, USENIX Security 2020","author":"Flores-Montoya Antonio","year":"2020","unstructured":"Antonio Flores-Montoya and Eric\u00a0 M. Schulte . 2020 . Datalog Disassembly. In 29th USENIX Security Symposium, USENIX Security 2020 , August 12-14, 2020, Srdjan Capkunand Franziska Roesner (Eds.). USENIX Association, 1075\u20131092. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/flores-montoya Antonio Flores-Montoya and Eric\u00a0M. Schulte. 2020. Datalog Disassembly. In 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, Srdjan Capkunand Franziska Roesner (Eds.). USENIX Association, 1075\u20131092. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/flores-montoya"},{"key":"e_1_3_2_1_20_1","unstructured":"GNU Project Free\u00a0Software Foundation. 2022. GNU make. https:\/\/www.gnu.org\/software\/make\/manual\/make.html.  GNU Project Free\u00a0Software Foundation. 2022. GNU make. https:\/\/www.gnu.org\/software\/make\/manual\/make.html."},{"key":"e_1_3_2_1_21_1","unstructured":"Glenn Fowler Phong Vo and Landon\u00a0Curt Noll. 2012. The FNV Non-Cryptographic Hash Algorithm. https:\/\/datatracker.ietf.org\/doc\/html\/draft-eastlake-fnv-03.  Glenn Fowler Phong Vo and Landon\u00a0Curt Noll. 2012. The FNV Non-Cryptographic Hash Algorithm. https:\/\/datatracker.ietf.org\/doc\/html\/draft-eastlake-fnv-03."},{"key":"e_1_3_2_1_22_1","unstructured":"Inc Free Software\u00a0Foundation. 2022. Using the GNU Compiler Collection (GCC). https:\/\/gcc.gnu.org\/onlinedocs\/gcc-4.7.2\/gcc\/Optimize-Options.html.  Inc Free Software\u00a0Foundation. 2022. Using the GNU Compiler Collection (GCC). https:\/\/gcc.gnu.org\/onlinedocs\/gcc-4.7.2\/gcc\/Optimize-Options.html."},{"key":"e_1_3_2_1_23_1","unstructured":"freepascal 2021. Free Pascal. https:\/\/www.freepascal.org\/.  freepascal 2021. Free Pascal. https:\/\/www.freepascal.org\/."},{"key":"e_1_3_2_1_24_1","unstructured":"ghidra 2022. Ghidra. https:\/\/ghidra-sre.org\/.  ghidra 2022. Ghidra. https:\/\/ghidra-sre.org\/."},{"key":"e_1_3_2_1_25_1","unstructured":"gnu 2022. GCC the GNU Compiler Collection. http:\/\/www.gnu.org\/software\/gcc\/index.html.  gnu 2022. GCC the GNU Compiler Collection. http:\/\/www.gnu.org\/software\/gcc\/index.html."},{"key":"e_1_3_2_1_26_1","volume-title":"RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings(Lecture Notes in Computer Science, Vol.\u00a06961)","author":"Gr\u00f6bert Felix","year":"2011","unstructured":"Felix Gr\u00f6bert , Carsten Willems , and Thorsten Holz . 2011 . Automated Identification of Cryptographic Primitives in Binary Programs. In Recent Advances in Intrusion Detection - 14th International Symposium , RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings(Lecture Notes in Computer Science, Vol.\u00a06961) , Robin Sommer, Davide Balzarotti, and Gregor Maier (Eds.). Springer, 41\u201360. https:\/\/doi.org\/10.1007\/978-3-642-23644-0_3 10.1007\/978-3-642-23644-0_3 Felix Gr\u00f6bert, Carsten Willems, and Thorsten Holz. 2011. Automated Identification of Cryptographic Primitives in Binary Programs. In Recent Advances in Intrusion Detection - 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings(Lecture Notes in Computer Science, Vol.\u00a06961), Robin Sommer, Davide Balzarotti, and Gregor Maier (Eds.). Springer, 41\u201360. https:\/\/doi.org\/10.1007\/978-3-642-23644-0_3"},{"key":"e_1_3_2_1_27_1","unstructured":"Christian Heimes. [n.d.]. PEP 456 \u2013 Secure and interchangeable hash algorithm. https:\/\/www.python.org\/dev\/peps\/pep-0456\/.  Christian Heimes. [n.d.]. PEP 456 \u2013 Secure and interchangeable hash algorithm. https:\/\/www.python.org\/dev\/peps\/pep-0456\/."},{"key":"e_1_3_2_1_28_1","unstructured":"Hex-Rays. [n.d.]. IDA F.L.I.R.T. Technology: In-Depth. https:\/\/hex-rays.com\/products\/ida\/tech\/flirt\/in_depth\/.  Hex-Rays. [n.d.]. IDA F.L.I.R.T. Technology: In-Depth. https:\/\/hex-rays.com\/products\/ida\/tech\/flirt\/in_depth\/."},{"volume-title":"The C Programming Language","author":"Kernighan Brian","key":"e_1_3_2_1_29_1","unstructured":"Brian Kernighan and Dennis Ritchie . 1972. The C Programming Language . Prentice Hall PTR , New Jersey, USA. Brian Kernighan and Dennis Ritchie. 1972. The C Programming Language. Prentice Hall PTR, New Jersey, USA."},{"key":"e_1_3_2_1_30_1","volume-title":"NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07873)","author":"Kirrage James","year":"2013","unstructured":"James Kirrage , Asiri Rathnayake , and Hayo Thielecke . 2013 . Static Analysis for Regular Expression Denial-of-Service Attacks. In Network and System Security - 7th International Conference , NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07873) , Javier L\u00f3pez, Xinyi Huang, and Ravi\u00a0S. Sandhu (Eds.). Springer, 135\u2013148. https:\/\/doi.org\/10.1007\/978-3-642-38631-2_11 10.1007\/978-3-642-38631-2_11 James Kirrage, Asiri Rathnayake, and Hayo Thielecke. 2013. Static Analysis for Regular Expression Denial-of-Service Attacks. In Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07873), Javier L\u00f3pez, Xinyi Huang, and Ravi\u00a0S. Sandhu (Eds.). Springer, 135\u2013148. https:\/\/doi.org\/10.1007\/978-3-642-38631-2_11"},{"key":"e_1_3_2_1_31_1","volume-title":"The art of computer programming","author":"Knuth Donald\u00a0Ervin","unstructured":"Donald\u00a0Ervin Knuth . 1998. The art of computer programming ,, Volume III , 2 nd Edition. Addison-Wesley . http:\/\/www.worldcat.org\/oclc\/312994415 Donald\u00a0Ervin Knuth. 1998. The art of computer programming,, Volume III, 2nd Edition. Addison-Wesley. http:\/\/www.worldcat.org\/oclc\/312994415","edition":"2"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxt070"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714639"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v008.i14"},{"key":"e_1_3_2_1_35_1","volume-title":"30th USENIX Security Symposium, USENIX Security 2021","author":"Meijer Carlo","year":"2021","unstructured":"Carlo Meijer , Veelasha Moonsamy , and Jos Wetzels . 2021 . Where\u2019s Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code . In 30th USENIX Security Symposium, USENIX Security 2021 , August 11-13, 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 555\u2013572. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/meijer Carlo Meijer, Veelasha Moonsamy, and Jos Wetzels. 2021. Where\u2019s Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 555\u2013572. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/meijer"},{"key":"e_1_3_2_1_36_1","volume-title":"27th USENIX Security Symposium, USENIX Security 2018","author":"Meng Wei","year":"2018","unstructured":"Wei Meng , Chenxiong Qian , Shuang Hao , Kevin Borgolte , Giovanni Vigna , Christopher Kruegel , and Wenke Lee . 2018 . Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks . In 27th USENIX Security Symposium, USENIX Security 2018 , Baltimore, MD, USA , August 15-17, 2018, William Enck and Adrienne\u00a0Porter Felt (Eds.). USENIX Association, 393\u2013410. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/meng Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, and Wenke Lee. 2018. Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018, William Enck and Adrienne\u00a0Porter Felt (Eds.). USENIX Association, 393\u2013410. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/meng"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00049"},{"key":"e_1_3_2_1_38_1","unstructured":"perlsec - Perl security. 2003. Algorithmic Complexity Attacks. https:\/\/perldoc.perl.org\/perlsec.html.  perlsec - Perl security. 2003. Algorithmic Complexity Attacks. https:\/\/perldoc.perl.org\/perlsec.html."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134073"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the Fifth International Conference on Database Systems for Advanced Applications (DASFAA)","author":"V.","year":"1997","unstructured":"M.\u00a0 V. Ramakrishna and Justin Zobel. 1997. Performance in Practice of String Hashing Functions. In Database Systems for Advanced Applications \u201997 , Proceedings of the Fifth International Conference on Database Systems for Advanced Applications (DASFAA) , Melbourne, Australia , April 1-4, 1997 (Advanced Database Research and Development Series, Vol.\u00a06), Rodney\u00a0W. Topor and Katsumi Tanaka (Eds.). World Scientific, 215\u2013224. M.\u00a0V. Ramakrishna and Justin Zobel. 1997. Performance in Practice of String Hashing Functions. In Database Systems for Advanced Applications \u201997, Proceedings of the Fifth International Conference on Database Systems for Advanced Applications (DASFAA), Melbourne, Australia, April 1-4, 1997(Advanced Database Research and Development Series, Vol.\u00a06), Rodney\u00a0W. Topor and Katsumi Tanaka (Eds.). World Scientific, 215\u2013224."},{"key":"e_1_3_2_1_41_1","unstructured":"reddit 2005. Reddit. https:\/\/www.reddit.com.  reddit 2005. Reddit. https:\/\/www.reddit.com."},{"key":"e_1_3_2_1_42_1","unstructured":"sdbm 2007. SDBM Library. https:\/\/apr.apache.org\/docs\/apr-util\/0.9\/group__APR__Util__DBM__SDBM.html.  sdbm 2007. SDBM Library. https:\/\/apr.apache.org\/docs\/apr-util\/0.9\/group__APR__Util__DBM__SDBM.html."},{"volume-title":"Algorithms in C","author":"Sedgewick Robert","key":"e_1_3_2_1_43_1","unstructured":"Robert Sedgewick . 1990. Algorithms in C . Addison-Wesley Professional , Bosotn, MA . Robert Sedgewick. 1990. Algorithms in C. Addison-Wesley Professional, Bosotn, MA."},{"key":"e_1_3_2_1_44_1","unstructured":"snudown 2018. Snudown. https:\/\/www.github.com\/reddit\/snudown.  snudown 2018. Snudown. https:\/\/www.github.com\/reddit\/snudown."},{"key":"e_1_3_2_1_45_1","unstructured":"JHU\/APL Staff. 2019. Assembled Labeled Library for Static Analysis Research (ALLSTAR) Dataset. http:\/\/allstar.jhuapl.edu\/  JHU\/APL Staff. 2019. Assembled Labeled Library for Static Analysis Research (ALLSTAR) Dataset. http:\/\/allstar.jhuapl.edu\/"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90033-7"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.49"}],"event":{"name":"RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2022","location":"Limassol Cyprus"},"container-title":["Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545967","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3545948.3545967","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:27Z","timestamp":1750188627000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545967"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":47,"alternative-id":["10.1145\/3545948.3545967","10.1145\/3545948"],"URL":"https:\/\/doi.org\/10.1145\/3545948.3545967","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}