例文
- This algorithmic complexity attack can overwhelm the IDS with a relatively small amount of bandwidth.
- Techniques for single-stepping a victim program include file system mazes and algorithmic complexity attacks.
- Algorithmic complexity attacks force the victim to spend its entire scheduling quantum inside a single system call traversing the kernel's hash table of cached file names.