Analyzing and Discovering Spatial Algorithm Complexity Vulnerabilities in Recursion

The algorithmic complexity vulnerability (ACV) that may lead to denial of service attacks greatly disrupts the security and availability of applications, and due to the widespread use of third-party libraries, its impact may be amplified through the software supply chain. The existing work in the fi...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Applied sciences Ročník 14; číslo 5; s. 1855
Hlavní autoři: Wang, Ziqi, Bu, Debao, Tian, Weihan, Cui, Baojiang
Médium: Journal Article
Jazyk:angličtina
Vydáno: Basel MDPI AG 01.03.2024
Témata:
ISSN:2076-3417, 2076-3417
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The algorithmic complexity vulnerability (ACV) that may lead to denial of service attacks greatly disrupts the security and availability of applications, and due to the widespread use of third-party libraries, its impact may be amplified through the software supply chain. The existing work in the field is dedicated to abstract loop or iterative patterns and fuzzing the entire application to discover algorithm complexity vulnerabilities, but they still face efficiency and effectiveness issues. Our research focuses on: (1) proposing a representation and extraction method for code features related to algorithmic complexity vulnerabilities, helping analysts quickly understand program logic; (2) providing a new ACV detecting model, focusing on the spatial complexity anomalies caused by deep recursion structures, and proposing a new filtering method; and (3) aiming at the difficulty of efficiently generating complex-data-type-related payloads using existing symbol execution techniques, a call-chain-guided payload construction method is proposed. We tested third-party components in the open-source Java Maven Repository, identified many unexposed vulnerabilities, and eight of them received Common Vulnerabilities and Exposures (CVE) identifiers, and demonstrated that our method can discover more algorithmic complexity vulnerabilities compared to existing tools with better performance.
AbstractList The algorithmic complexity vulnerability (ACV) that may lead to denial of service attacks greatly disrupts the security and availability of applications, and due to the widespread use of third-party libraries, its impact may be amplified through the software supply chain. The existing work in the field is dedicated to abstract loop or iterative patterns and fuzzing the entire application to discover algorithm complexity vulnerabilities, but they still face efficiency and effectiveness issues. Our research focuses on: (1) proposing a representation and extraction method for code features related to algorithmic complexity vulnerabilities, helping analysts quickly understand program logic; (2) providing a new ACV detecting model, focusing on the spatial complexity anomalies caused by deep recursion structures, and proposing a new filtering method; and (3) aiming at the difficulty of efficiently generating complex-data-type-related payloads using existing symbol execution techniques, a call-chain-guided payload construction method is proposed. We tested third-party components in the open-source Java Maven Repository, identified many unexposed vulnerabilities, and eight of them received Common Vulnerabilities and Exposures (CVE) identifiers, and demonstrated that our method can discover more algorithmic complexity vulnerabilities compared to existing tools with better performance.
Audience Academic
Author Bu, Debao
Tian, Weihan
Cui, Baojiang
Wang, Ziqi
Author_xml – sequence: 1
  givenname: Ziqi
  orcidid: 0000-0002-5089-8918
  surname: Wang
  fullname: Wang, Ziqi
– sequence: 2
  givenname: Debao
  surname: Bu
  fullname: Bu, Debao
– sequence: 3
  givenname: Weihan
  orcidid: 0000-0002-9302-8525
  surname: Tian
  fullname: Tian, Weihan
– sequence: 4
  givenname: Baojiang
  surname: Cui
  fullname: Cui, Baojiang
BookMark eNpNUU1vEzEQtVCRKKUn_sBKHFGKvf4-RgFKpUpIlPZqzXrHwdHGXuwNIv31uAShzhzmQ_PejOa9JmcpJyTkLaNXnFv6AeaZCSqZkfIFOe-pVisumD57lr8il7XuaDPLuGH0nNytE0zHx5i2HaSx-xirz7-wPNV3MywRpm49bXOJy499t8n7ecLfcTl2D4cpYYEhTnGJWLuYum_oD6XGnN6QlwGmipf_4gW5__zp--bL6vbr9c1mfbvyXLFlZZX1g7ecsQGQKduPPDA5GBG0EaBGGrQceEBroZc6GCHQKNSo-wGMoCO_IDcn3jHDzs0l7qEcXYbo_jZy2TooS_QTOq6kAk4HIYwSpudGWmFHrXUAY0aFjevdiWsu-ecB6-J2-VDab6rrrZSCtwNNm7o6TW2hkcYU8lLANx9xH32TI8TWX-u2pBdM8QZ4fwL4kmstGP6fyah7Us09U43_AZCdiqc
Cites_doi 10.1145/3548606.3559337
10.1145/3510003.3510047
10.1145/3213846.3213868
10.1145/3238147.3238159
10.1145/3532184
10.1145/1925805.1925818
10.1145/3338906.3341177
10.1007/978-3-031-10363-6
10.1145/3236024.3236039
10.1007/978-3-319-46586-9
10.1109/ICSE.2009.5070545
10.1145/2950290.2950340
10.1007/978-3-662-49674-9
10.1109/SCAM.2016.23
10.1109/SP40001.2021.00062
10.1109/ICST.2017.13
10.1145/3236024.3236027
10.1109/SP46215.2023.10179328
10.1145/3179541.3168830
10.1145/3416507.3423189
10.1016/j.future.2021.09.006
ContentType Journal Article
Copyright COPYRIGHT 2024 MDPI AG
2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: COPYRIGHT 2024 MDPI AG
– notice: 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQQKQ
PQUKI
DOA
DOI 10.3390/app14051855
DatabaseName CrossRef
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One
ProQuest Central
Proquest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
ProQuest Central
ProQuest One Academic Middle East (New)
ProQuest One Academic UKI Edition
ProQuest Central Essentials
ProQuest Central Korea
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList

Publicly Available Content Database
CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISSN 2076-3417
ExternalDocumentID oai_doaj_org_article_3656a30b4486482385949d777fa88d6e
A786424163
10_3390_app14051855
GeographicLocations Germany
GeographicLocations_xml – name: Germany
GroupedDBID .4S
2XV
5VS
7XC
8CJ
8FE
8FG
8FH
AADQD
AAFWJ
AAYXX
ADBBV
ADMLS
AFFHD
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
APEBS
ARCSS
BCNDV
BENPR
CCPQU
CITATION
CZ9
D1I
D1J
D1K
GROUPED_DOAJ
IAO
IGS
ITC
K6-
K6V
KC.
KQ8
L6V
LK5
LK8
M7R
MODMG
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PROAC
TUS
ABUWG
AZQEC
DWQXO
PKEHL
PQEST
PQQKQ
PQUKI
ID FETCH-LOGICAL-c361t-969cbc9311bae1692d3f15b84f784a6d0f75b3fe99a257f844e86e7e72ba840d3
IEDL.DBID DOA
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001182608700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2076-3417
IngestDate Tue Oct 14 19:05:16 EDT 2025
Mon Jun 30 14:36:57 EDT 2025
Tue Nov 04 18:27:24 EST 2025
Sat Nov 29 07:09:02 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 5
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c361t-969cbc9311bae1692d3f15b84f784a6d0f75b3fe99a257f844e86e7e72ba840d3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-5089-8918
0000-0002-9302-8525
OpenAccessLink https://doaj.org/article/3656a30b4486482385949d777fa88d6e
PQID 2955431698
PQPubID 2032433
ParticipantIDs doaj_primary_oai_doaj_org_article_3656a30b4486482385949d777fa88d6e
proquest_journals_2955431698
gale_infotracacademiconefile_A786424163
crossref_primary_10_3390_app14051855
PublicationCentury 2000
PublicationDate 2024-03-01
PublicationDateYYYYMMDD 2024-03-01
PublicationDate_xml – month: 03
  year: 2024
  text: 2024-03-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Applied sciences
PublicationYear 2024
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References ref_35
ref_12
ref_34
ref_11
ref_33
(ref_36) 2017; Volume 74
ref_10
ref_32
ref_31
ref_30
ref_19
ref_18
ref_17
ref_39
ref_16
ref_38
ref_15
ref_37
Li (ref_14) 2022; 127
ref_25
ref_47
ref_24
ref_46
ref_23
ref_45
ref_22
ref_44
ref_21
ref_43
ref_20
ref_42
ref_41
ref_40
ref_1
ref_3
ref_2
ref_29
ref_28
ref_27
ref_26
ref_48
ref_9
ref_8
Blair (ref_13) 2022; 25
ref_5
ref_4
Olivo (ref_6) 2017; Volume 10206
ref_7
References_xml – ident: ref_28
– ident: ref_9
– ident: ref_30
– volume: Volume 74
  start-page: 10:1
  year: 2017
  ident: ref_36
  article-title: Evil Pickles: DoS Attacks Based on Object-Graph Engineering
  publication-title: Proceedings of the 31st European Conference on Object-Oriented Programming (ECOOP 2017), Barcelona, Spain, 19–23 June 2017
– ident: ref_5
– ident: ref_32
– ident: ref_3
– ident: ref_11
  doi: 10.1145/3548606.3559337
– ident: ref_26
– ident: ref_31
  doi: 10.1145/3510003.3510047
– ident: ref_47
– ident: ref_17
  doi: 10.1145/3213846.3213868
– ident: ref_23
  doi: 10.1145/3238147.3238159
– volume: 25
  start-page: 1
  year: 2022
  ident: ref_13
  article-title: HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing
  publication-title: ACM Trans. Priv. Secur.
  doi: 10.1145/3532184
– ident: ref_34
  doi: 10.1145/1925805.1925818
– ident: ref_40
– ident: ref_12
  doi: 10.1145/3338906.3341177
– ident: ref_42
– ident: ref_1
– ident: ref_20
  doi: 10.1007/978-3-031-10363-6
– ident: ref_35
– ident: ref_44
– ident: ref_16
  doi: 10.1145/3236024.3236039
– ident: ref_29
  doi: 10.1007/978-3-319-46586-9
– ident: ref_37
  doi: 10.1109/ICSE.2009.5070545
– ident: ref_19
  doi: 10.1145/2950290.2950340
– ident: ref_39
  doi: 10.1007/978-3-662-49674-9
– ident: ref_24
  doi: 10.1109/SCAM.2016.23
– ident: ref_25
– ident: ref_4
– ident: ref_18
  doi: 10.1109/SP40001.2021.00062
– ident: ref_33
– ident: ref_27
– ident: ref_2
– ident: ref_46
– ident: ref_48
– ident: ref_10
– ident: ref_38
  doi: 10.1109/ICST.2017.13
– ident: ref_41
– ident: ref_15
– volume: Volume 10206
  start-page: 3
  year: 2017
  ident: ref_6
  article-title: Static Detection of DoS Vulnerabilities in Programs That Use Regular Expressions
  publication-title: Proceedings of the 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Uppsala, Sweden, 22–29 April 2017, Proceedings, Part II
– ident: ref_45
– ident: ref_7
  doi: 10.1145/3236024.3236027
– ident: ref_43
– ident: ref_8
  doi: 10.1109/SP46215.2023.10179328
– ident: ref_21
  doi: 10.1145/3179541.3168830
– ident: ref_22
  doi: 10.1145/3416507.3423189
– volume: 127
  start-page: 384
  year: 2022
  ident: ref_14
  article-title: CVFuzz: Detecting Complexity Vulnerabilities in OpenCL Kernels via Automated Pathological Input Generation
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2021.09.006
SSID ssj0000913810
Score 2.2764692
Snippet The algorithmic complexity vulnerability (ACV) that may lead to denial of service attacks greatly disrupts the security and availability of applications, and...
SourceID doaj
proquest
gale
crossref
SourceType Open Website
Aggregation Database
Index Database
StartPage 1855
SubjectTerms Algorithms
Analysis
Automation
call chain
Computational linguistics
Critical path
Denial of service attacks
Efficiency
Java
Language processing
Logistics
Methods
Natural language interfaces
recursion structure
Safety and security measures
Software
spatial algorithm complexity vulnerability
Third party
Web applications
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT9wwEB7x6AEOvCu20MoHJOghYhM7fpwQT_VQrRCPiptlJw6sRLN0EyqVX89M1gv0QC89JnEcR9-MPTMefwOwI3JV6Dy4pF-qLKEaV4nXiieo485UPvXCdZT539VgoG9uzHkMuDUxrXI6J3YTdTkqKEa-n5m8O7Zt9MHDr4SqRtHuaiyhMQvzxFSGcj5_dDo4v3iJshDrpU77k4N5HP172hdGnyLHZSr_aynqGPvfm5e7xeZs-X-HuQJL0cxkhxO5WIWZUK_B4hvywTVYjWrdsL3IPf11HS47kpInbMBcXbKTYVNQjiddU_HiIfV5f4sfbO9-MppLiE-z_cN-PN5TF12mLfrebFizC4rkUyxuA67PTq-OvyWx7kJScJm2iZGm8IXhaepdwF_JSl6ludeiUlo4WfYrlXteBWMcKnylhQhaBhVU5h36iyX_CHP1qA6bwGQVpHSZCmjmCaEKn6JF4o3PKLsKUejBzhQC-zCh17DolhBS9g1SPTgieF6aECd2d2M0vrVRxSxH09TxvkeHUwqNpkhuhCmVUpXTupShB7sEriXNbccoi_EAAo6UOLDsocL3MjJQe7A9BddGlW7sK7Kf_v14CxYytHwmiWrbMNeOH8Nn-FD8bofN-EuU0GfSYO-r
  priority: 102
  providerName: ProQuest
Title Analyzing and Discovering Spatial Algorithm Complexity Vulnerabilities in Recursion
URI https://www.proquest.com/docview/2955431698
https://doaj.org/article/3656a30b4486482385949d777fa88d6e
Volume 14
WOSCitedRecordID wos001182608700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: DOA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: M~E
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: BENPR
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: PIMPY
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT9wwEB4h2gMcUHmJbQH5gAQcIjax48cRCqhIZbXiJThZduJAJBrQbqjU_vrOOKHaHlAvHB0lljXjeXzO-BuAHZGrQufBJcNSZQn1uEq8VjxBG3em8qkXLlLmf1ejkb69NeOZVl9UE9bRA3eCO-CYcDg-9AgjpNAYYHIjTKmUqpzWpQzkfYfKzICp6INNStRV3YU8jrie_gcjlsgxPOX_hKDI1P-WP45B5vQTLPXZITvsVrUMc6FZgcUZzsAVWO6tccr2esro_VW4jNwiv_EF5pqSHdfTgkozaUw9h2ua8_H-aVK3Dz8YuQCiwWx_sZuXR5oiFsgiZGZ1wy7oAJ6O0Nbg-vTk6uu3pG-XkBRcpm1ipCl8YXiaehdSabKSV2nutaiUFk6Ww0rlnlfBGId2WmkhgpZBBZV5hzCv5Osw3zw1YQOYrIKULlMBszMhVOFTTCS88RkVRaEQB7DzKkH73LFiWEQTJGg7I-gBHJF0_75CVNbxASrY9gq2_1PwAHZJN5YMrp3gFurvDeBKibrKHir8LqO8cgCbr-qzvSVObWbyeN3f6M_vsZovsJBhWtNVoW3CfDt5CVvwsfjZ1tPJNnw4OhmNL7bjZsTR-Ox8fPcHzfTh9A
linkProvider Directory of Open Access Journals
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3BbtQwEB2VLRLlALRQsVAghyLgEJHYTmwfECqUqqtuVysoqJyMnTglUsmWTQoqH8U3MpNNSjnArQeOSZxRHD-PZ-yZNwCbIpGZSrwNo1yykGpchU5JHuIct7pwsRO2pcwfy8lEHR7q6RL87HNhKKyy14mtos5nGe2RP2c6adO2tXp58jWkqlF0utqX0FjAYs-ffUeXrX4x2sbxfczYzpuD17thV1UgzHgaN6FOdeYyzePYWY_yWM6LOHFKFFIJm-ZRIRPHC6-1RTgXSgivUi-9ZM6iN5RzlHsFlgWBfQDL09H-9OP5rg6xbKo4WiQCcq4jOodGHybBZTH5Y-lrKwT8bR1oF7edm__bb7kFNzozOtha4H4Vlny1BtcvkCuuwWqnturgacet_ew2vGtJWH5gg8BWebBd1hnFsNI1FWcuSebxEXaw-fwlIF1JfKHNWfDh9JhEtJHEJYosq-AtnVTQXuMdeH8pXV2HQTWr_F0I0sKnqWXSoxkrhMxcjBaX045R9BiO-hA2-yE3Jwv6EINuFyHDXEDGEF4RHM6bEOd3e2M2PzKdCjEcTW_LI4cOdSoUmlqJFjqXUhZWqTz1Q3hCYDKkmZo5zrUuwQK_lDi-zJbE9xgZ4EPY6MFkOpVVm99Iuvfvx4_g2u7B_tiMR5O9-7DC0MpbBOVtwKCZn_oHcDX71pT1_GE3OwL4dNnI-wWG9Uzm
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VLUJwAFpAXSiQQxFwiJrYTmwfECosK1YtqxUvlZOxE6dEanfLJgWVn8avYyaPUg5w64FjEmcUx5_HM_bMNwBbIpGZSrwNo1yykGpchU5JHuIct7pwsRO2oczfk9Op2t_XsxX42efCUFhlrxMbRZ0vMtoj32Y6adK2tdouurCI2Wj8_PhrSBWk6KS1L6fRQmTXn35H9616NhnhWD9ibPzq_cvXYVdhIMx4GtehTnXmMs3j2FmPslnOizhxShRSCZvmUSETxwuvtUVoF0oIr1IvvWTOomeUc5R7CVbRJBdsAKuzyZvZp7MdHmLcVHHUJgVyriM6k0Z_JsElMvljGWyqBfxtTWgWuvGN__kX3YTrnXkd7LTzYQ1W_Hwdrp0jXVyHtU6dVcGTjnP76S1415Cz_MAGgZ3nwaisMoptpWsq2lySzMMD7GD95SggHUo8ovVp8PHkkEQ0EcYliiznwVs6waA9yNvw4UK6egcG88Xcb0CQFj5NLZMezVshZOZitMScdoyiyhABQ9jqh98ct7QiBt0xQok5h5IhvCBonDUhLvDmxmJ5YDrVYjia5JZHDh3tVCg0wRItdC6lLKxSeeqH8JiAZUhj1Uucg13iBX4pcX-ZHYnvMTLMh7DZA8t0qqwyv1F199-PH8IVhJvZm0x378FVhsZfG6u3CYN6eeLvw-XsW11WywfdRAng80UD7xcBwVWm
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Analyzing+and+Discovering+Spatial+Algorithm+Complexity+Vulnerabilities+in+Recursion&rft.jtitle=Applied+sciences&rft.au=Ziqi+Wang&rft.au=Debao+Bu&rft.au=Weihan+Tian&rft.au=Baojiang+Cui&rft.date=2024-03-01&rft.pub=MDPI+AG&rft.eissn=2076-3417&rft.volume=14&rft.issue=5&rft.spage=1855&rft_id=info:doi/10.3390%2Fapp14051855&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_3656a30b4486482385949d777fa88d6e
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon