Skip to content

Details

In this talk, we’ll explore the mathematical underpinnings of regexes, how regexes get implemented and used in real systems, and how insecure regexes can open the door to denial-of-service attacks. You’ll leave with a deeper theoretical understanding of regexes and the practical knowledge to spot the characteristics of insecure regexes.

Person presenting: bubbles

Members are also interested in