ICSE 2022 (series) / NIER - New Ideas and Emerging Results /
Runtime Prevention of Deserialization Attacks
Mon 9 May 2022 22:00 - 22:05 at ICSE room 3-even hours - Programming Languages 2 Chair(s): Karim Ali
Thu 12 May 2022 04:00 - 04:05 at ICSE room 5-even hours - Programming Languages 1 Chair(s): Jean-Guy Schneider
Thu 12 May 2022 04:00 - 04:05 at ICSE room 5-even hours - Programming Languages 1 Chair(s): Jean-Guy Schneider
Untrusted deserialization exploits, where a serialised object graph is used to achieve denial-of-service or arbitrary code execution, have become so prominent that they were introduced in the 2017 OWASP Top 10. In this paper, we present a novel and lightweight approach for runtime prevention of deserialization attacks using Markov chains. The intuition behind our work is that the features and ordering of classes in malicious object graphs make them distinguishable from benign ones. Preliminary results indeed show that our approach achieves an F1-score of 0.94 on a dataset of 264 serialised payloads, collected from an industrial Java EE application server and a repository of deserialization exploits.
Mon 9 MayDisplayed time zone: Eastern Time (US & Canada) change
Mon 9 May
Displayed time zone: Eastern Time (US & Canada) change
Thu 12 MayDisplayed time zone: Eastern Time (US & Canada) change
Thu 12 May
Displayed time zone: Eastern Time (US & Canada) change
Information for Participants
Mon 9 May 2022 22:00 - 23:00 at ICSE room 3-even hours - Programming Languages 2 Chair(s): Karim Ali
Info for room ICSE room 3-even hours:
Thu 12 May 2022 04:00 - 05:00 at ICSE room 5-even hours - Programming Languages 1 Chair(s): Jean-Guy Schneider
Info for room ICSE room 5-even hours: