# HG changeset patch # User Christian Urban # Date 1537909034 -3600 # Node ID fa6d00968b0e95d5dd9b44726f5197c259283777 # Parent 164bcaaedf888fa2c037dbecf1561ae82188cd3b updated diff -r 164bcaaedf88 -r fa6d00968b0e handouts/ho01.pdf Binary file handouts/ho01.pdf has changed diff -r 164bcaaedf88 -r fa6d00968b0e handouts/ho01.tex --- a/handouts/ho01.tex Tue Sep 25 20:50:42 2018 +0100 +++ b/handouts/ho01.tex Tue Sep 25 21:57:14 2018 +0100 @@ -257,7 +257,7 @@ worse.\footnote{In this example Ruby uses the slightly different regular expression \texttt{a?a?a?...a?a?aaa...aa}, where the \texttt{a?} and \texttt{a} each occur $n$ times. More such test - cases can be found at \url{http://www.computerbytesman.com/redos/}.} + cases can be found at \url{https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS}.} Admittedly, these regular expressions are carefully chosen to exhibit this exponential behaviour, but similar ones occur more often than one wants in ``real life''. For example, on 20 July 2016 a similar regular