that exploit algorithmic deficiencies in the worst
case performance of algorithms used in many mainstream applications. For example, both binary
trees and hash tables with carefully chosen input can be the attack targets to consume system resources greatly