Skip to main content

Showing 1–2 of 2 results for author: Burmane, E H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.03949  [pdf, other

    cs.CR cs.SE

    Establishing Provenance Before Coding: Traditional and Next-Gen Software Signing

    Authors: Taylor R. Schorlemmer, Ethan H. Burmane, Kelechi G. Kalu, Santiago Torres-Arias, James C. Davis

    Abstract: Software engineers integrate third-party components into their applications. The resulting software supply chain is vulnerable. To reduce the attack surface, we can verify the origin of components (provenance) before adding them. Cryptographic signatures enable this. This article describes traditional signing, its challenges, and the changes introduced by next-generation signing platforms.

    Submitted 29 January, 2025; v1 submitted 4 July, 2024; originally announced July 2024.

  2. SoK: A Literature and Engineering Review of Regular Expression Denial of Service (ReDoS)

    Authors: Masudul Hasan Masud Bhuiyan, Berk Çakar, Ethan H. Burmane, James C. Davis, Cristian-Alexandru Staicu

    Abstract: Regular Expression Denial of Service (ReDoS) is a vulnerability class that has become prominent in recent years. Attackers can weaponize such weaknesses as part of asymmetric cyberattacks that exploit the slow worst-case matching time of regular expression (regex) engines. In the past, problematic regexes have led to outages at Cloudflare and Stack Overflow, showing the severity of the problem. Wh… ▽ More

    Submitted 26 August, 2025; v1 submitted 17 June, 2024; originally announced June 2024.

    Comments: 17 pages, 5 figures. Published in ASIA CCS '25

    Journal ref: Proceedings of the 20th ACM Asia Conference on Computer and Communications Security (ASIA CCS '25) (2025) 1659-1675