Skip to main content
To KTH's start page To KTH's start page

2021-11-9: An In-depth Study of Java Deserialization Exploits and Vulnerabilities

Alexandre Bartel  from Umeå University will give a seminar on November 9th, 2021,10:00 - 11:00. Lindstedtsvägen 5, 5th floor, room 4523. The title of the talk is "An In-depth Study of Java Deserialization Exploits and Vulnerabilities"

Abstract:
Deserialization, a technique based on rebuilding instances of objects from a byte streams, is dangerous since it can open an application to attacks such as remote code execution (RCE) if the data to deserialize
originates from an untrusted source. Deserialization vulnerabilities are so critical that they are in OWASP’s list of top 10 security risks for web applications. This is mainly caused by faults in the development process of applications and by flaws in their dependencies such as flaws in libraries used by these applications. In this talk we dissect Java deserialization vulnerabilities and discuss (1) the analysis of gadgets based on 19 publicly known exploits and (2) the analysis of 104 CVEs to understand how vulnerabilities are introduced and patched in real world Java applications. We observe that the modification of one innocent-looking detail in a class – such as making it public – can already introduce a gadget. Furthermore, 37.5% of the gadgets are not patched, leaving them available for future attacks. Results also indicate that vulnerabilities are not always completely patched and that workaround solutions are often put in place.

Bio:
Alexandre Bartel is a Professor in the Department of Computing Science at Umeå University. His research interests are in the area of software engineering and computer security. His work as helped to find and fix
security weaknesses in Android applications, open-source projects, the Java Virtual Machine, and software operated by the industry.

Belongs to: School of Electrical Engineering and Computer Science
Last changed: Nov 02, 2021
Title
2021-12-08: Testing Software and Hardware against Speculation Contracts
2021-12 03: Practical Data Access Minimization in Trigger-Action Platforms
2021-11-16: Securing software in the presence of realistic attackers and polices
2021-11-9: An In-depth Study of Java Deserialization Exploits and Vulnerabilities
2019-02-05 Faceted Secure Multi-Execution
2019-01-11 Privacy-preserving ridesharing and multi key-homomorphic signatures
2018-11-06 Authentication and Pairing Using Human Body Impedance
2018-10-26 Security and Privacy in the IoT: An Information-Theoretic Perspective
2018-09-17 Cyber-Defence Panel
2018-09-13: Reconfigurable Distributed MIMO for Physical-layer Security in Mobile Networks
2018-09-03: A Constraint Programming approach to deliver a Tolerant Algebraic Side-Channel Attack of AES
2018-06-18: Coarse-grained information-flow control as a library in Haskell
2018-06-07: The capacity of private information retrieval with eavesdroppers
2018-05-23: Information-Flow Control for Concurrent Programs with Declassification
2018-05-09: Browser fingerprinting: past, present and possible future
2018-05-07: The Verificatum Project 10-year Anniversary