{"_id":"3QSS7DaubQmp9viFn","bibbaseid":"weideman-wang-kann-zahabizadeh-wu-tandon-mirkovic-hauser-harmdoshashalgorithmreplacementformitigatingdenialofservicevulnerabilitiesinbinaryexecutables-2022","author_short":["Weideman, N.","Wang, H.","Kann, T.","Zahabizadeh, S.","Wu, W.","Tandon, R.","Mirkovic, J.","Hauser, C."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Nicolaas"],"propositions":[],"lastnames":["Weideman"],"suffixes":[]},{"firstnames":["Haoda"],"propositions":[],"lastnames":["Wang"],"suffixes":[]},{"firstnames":["Tyler"],"propositions":[],"lastnames":["Kann"],"suffixes":[]},{"firstnames":["Spencer"],"propositions":[],"lastnames":["Zahabizadeh"],"suffixes":[]},{"firstnames":["Wei-Cheng"],"propositions":[],"lastnames":["Wu"],"suffixes":[]},{"firstnames":["Rajat"],"propositions":[],"lastnames":["Tandon"],"suffixes":[]},{"firstnames":["Jelena"],"propositions":[],"lastnames":["Mirkovic"],"suffixes":[]},{"firstnames":["Christophe"],"propositions":[],"lastnames":["Hauser"],"suffixes":[]}],"title":"Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables","booktitle":"RAID","year":"2022","bibtex":"@inproceedings{man29832022,\nauthor={Nicolaas Weideman and Haoda Wang and Tyler Kann and Spencer Zahabizadeh and Wei-Cheng Wu and Rajat Tandon and Jelena Mirkovic and Christophe Hauser},\ntitle={Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables},\nbooktitle={RAID},\nyear={2022}}\n\n\n","author_short":["Weideman, N.","Wang, H.","Kann, T.","Zahabizadeh, S.","Wu, W.","Tandon, R.","Mirkovic, J.","Hauser, C."],"key":"man29832022","id":"man29832022","bibbaseid":"weideman-wang-kann-zahabizadeh-wu-tandon-mirkovic-hauser-harmdoshashalgorithmreplacementformitigatingdenialofservicevulnerabilitiesinbinaryexecutables-2022","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/2WNBgwTRfefSKBGKb","dataSources":["2Fkx7mpveyLCGzDsW","smJny2HbQ4ct2q8T6","5ByepEgrvFujJFiRX"],"keywords":[],"search_terms":["harm","dos","hash","algorithm","replacement","mitigating","denial","service","vulnerabilities","binary","executables","weideman","wang","kann","zahabizadeh","wu","tandon","mirkovic","hauser"],"title":"Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables","year":2022}