no code implementations • 28 Aug 2017 • Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana
When such conditions are met, an attacker can launch Denial-of-Service attacks against a vulnerable application by providing inputs that trigger the worst-case behavior.
Cryptography and Security