Abstract
This artefact demonstrates the effects of the serialisation vulnerabilities described in the companion paper. It is composed of three components: scripts, including source code, for Java, Ruby and C# serialisation-vulnerabilities, two case studies that demonstrate attacks based on the vulnerabilities, and a contracts-based mitigation strategy for serialisation-based attacks on Java applications. The artefact allows users to witness how the serialisation-based vulnerabilities result in behavior that can be used in security attacks. It also supports the repeatability of the case study experiments and the benchmark for the mitigation measures proposed in the paper. Instructions for running the tasks are provided along with a description of the artefact setup.
| Original language | English |
|---|---|
| Pages (from-to) | 13:1-13:3 |
| Journal | Dagstuhl Artifacts Series (DARTS) |
| Volume | 3 |
| Issue number | 2 |
| DOIs | |
| Publication status | Published - 2017 |
| Externally published | Yes |
Fingerprint
Dive into the research topics of 'Evil Pickles: DoS Attacks Based on Object-Graph Engineering (Artifact)'. Together they form a unique fingerprint.Research output
- 1 Conference Paper
-
Evil Pickles: DoS Attacks Based on Object-Graph Engineering
Dietrich, J., Jezek, K., Rasheed, S., Tahir, A. & Potanin, A., Jun 2017, 31st European Conference on Object-Oriented Programming, ECOOP 2017. Müller, P. (ed.). Saarbrücken/Wadern: Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 32 p. 10. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 74).Research output: Chapter in Book/Report/Conference proceeding › Conference Paper › peer-review
Open Access17 Citations (Scopus)
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver