A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
We predict that we will soon witness attacks on all kinds of systems that will be based on the attacked systems' worstcase behavior. For example, the worst-case performance of Java Bytecode Verification rises quadratically with program length. By sending a legal, but difficult-to-verify program to a server virtual machine, we can keep that server occupied for an inordinate amount of time, effectively making it unavailable for useful work. The problem, however, is not restricted to mobile-codedoi:10.1145/1146269.1146279 dblp:conf/nspw/ProbstGF05 fatcat:g2xw6epbkrcoxf4mnfads4267y