Evil Pickles: DoS Attacks Based on Object-Graph Engineering (Artifact)

Authors Jens Dietrich, Kamil Jezek, Shawn Rasheed, Amjed Tahir, Alex Potanin



PDF
Thumbnail PDF

Artifact Description

DARTS.3.2.13.pdf
  • Filesize: 394 kB
  • 3 pages

Document Identifiers

Author Details

Jens Dietrich
Kamil Jezek
Shawn Rasheed
Amjed Tahir
Alex Potanin

Cite AsGet BibTex

Jens Dietrich, Kamil Jezek, Shawn Rasheed, Amjed Tahir, and Alex Potanin. Evil Pickles: DoS Attacks Based on Object-Graph Engineering (Artifact). In Special Issue of the 31st European Conference on Object-Oriented Programming (ECOOP 2017). Dagstuhl Artifacts Series (DARTS), Volume 3, Issue 2, pp. 13:1-13:3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2017)
https://doi.org/10.4230/DARTS.3.2.13

Artifact

Abstract

This artefact demonstrates the effects of the serialisation vulnerabilities described in the companion paper. It is composed of three components: scripts, including source code, for Java, Ruby and C# serialisation-vulnerabilities, two case studies that demonstrate attacks based on the vulnerabilities, and a contracts-based mitigation strategy for serialisation-based attacks on Java applications. The artefact allows users to witness how the serialisation-based vulnerabilities result in behavior that can be used in security attacks. It also supports the repeatability of the case study experiments and the benchmark for the mitigation measures proposed in the paper. Instructions for running the tasks are provided along with a description of the artefact setup.
Keywords
  • serialisation
  • denial of service
  • degradation of service
  • Java
  • C#
  • JavaScript
  • Ruby
  • vulnerabilities
  • library design
  • collection libraries

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail