Regexes and Denial of Service w/ bubbles
Details
In this talk, we’ll explore the mathematical underpinnings of regexes, how regexes get implemented and used in real systems, and how insecure regexes can open the door to denial-of-service attacks. You’ll leave with a deeper theoretical understanding of regexes and the practical knowledge to spot the characteristics of insecure regexes.
Person presenting: bubbles
