Improving Developers’ Understanding of Regex Denial of Service Tools through Anti-Patterns and Fix Strategies.

dc.contributor.authorHassan, Sk Adnan
dc.contributor.authorAamir, Zainab
dc.contributor.authorLee, Dongyoon
dc.contributor.authorDavis, James C.
dc.contributor.authorServant-Cortés, Francisco Javier
dc.date.accessioned2024-11-25T11:28:33Z
dc.date.available2024-11-25T11:28:33Z
dc.date.issued2023
dc.departamentoInstituto de Tecnología e Ingeniería del Software de la Universidad de Málaga
dc.description.abstractRegular expressions are used for diverse purposes, including input validation and firewalls. Unfortunately, they can also lead to a security vulnerability called ReDoS (Regular Expression Denial of Service), caused by a super-linear worstcase execution time during regex matching. Due to the severity and prevalence of ReDoS, past work proposed automatic tools to detect and fix regexes. Although these tools were evaluated in automatic experiments, their usability has not yet been studied; usability has not been a focus of prior work. Our insight is that the usability of existing tools to detect and fix regexes will improve if we complement them with anti-patterns and fix strategies of vulnerable regexes. We developed novel anti-patterns for vulnerable regexes, and a collection of fix strategies to fix them. We derived our anti-patterns and fix strategies from a novel theory of regex infinite ambiguity — a necessary condition for regexes vulnerable to ReDoS. We proved the soundness and completeness of our theory. We evaluated the effectiveness of our anti-patterns, both in an automatic experiment and when applied manually. Then, we evaluated how much our anti-patterns and fix strategies improve developers’ understanding of the outcome of detection and fixing tools. Our evaluation found that our anti-patterns were effective over a large dataset of regexes (N=209,188): 100% precision and 99% recall, improving the state of the art 50% precision and 87% recall. Our anti-patterns were also more effective than the state of the art when applied manually (N=20): 100% developers applied them effectively vs. 50% for the state of the art. Finally, our anti-patterns and fix strategies increased developers’ understanding using automatic tools (N=9): from median “Very weakly” to median “Strongly” when detecting vulnerabilities, and from median “Very weakly” to median “Very strongly” when fixing them.es_ES
dc.description.sponsorshipNSF #2135156, URJC C01INVESDISTes_ES
dc.identifier.urihttps://hdl.handle.net/10630/35288
dc.language.isoenges_ES
dc.relation.eventdateMayo 2023es_ES
dc.relation.eventplaceSan Francisco, California, Estados Unidoses_ES
dc.relation.eventtitleIEEE Symposium on Security and Privacy (SP)es_ES
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.accessRightsopen accesses_ES
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectSoftware - Diseñoes_ES
dc.subject.otherRegular expression denial of servicees_ES
dc.subject.otherRegular expressionses_ES
dc.subject.otherProgram comprehensiones_ES
dc.subject.otherUsabilityes_ES
dc.titleImproving Developers’ Understanding of Regex Denial of Service Tools through Anti-Patterns and Fix Strategies.es_ES
dc.typeconference outputes_ES
dspace.entity.typePublication
relation.isAuthorOfPublicationb5f2808e-94a0-4ab9-ba6e-9e121af1dd03
relation.isAuthorOfPublication.latestForDiscoveryb5f2808e-94a0-4ab9-ba6e-9e121af1dd03

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2023-SP-3-self-archival.pdf
Size:
464.38 KB
Format:
Adobe Portable Document Format
Description: