An In-Depth Study of More Than Ten Years of Java']Java Exploitation

被引:20
|
作者
Holzinger, Philipp [1 ]
Triller, Stefan [1 ]
Bartel, Alexandre [2 ]
Bodden, Eric [3 ,4 ]
机构
[1] Fraunhofer SIT, Darmstadt, Germany
[2] Tech Univ Darmstadt, Darmstadt, Germany
[3] Univ Paderborn, Paderborn, Germany
[4] Fraunhofer IEM, Paderborn, Germany
来源
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2016年
关键词
D O I
10.1145/2976749.2978361
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When created, the Java platform was among the first runtimes designed with security in mind. Yet, numerous Java versions were shown to contain far-reaching vulnerabilities, permitting denial-of-service attacks or even worse allowing intruders to bypass the runtime's sandbox mechanisms, opening the host system up to many kinds of further attacks. This paper presents a systematic in-depth study of 87 publicly available Java exploits found in the wild. By collecting, minimizing and categorizing those exploits, we identify their commonalities and root causes, with the goal of determining the weak spots in the Java security architecture and possible countermeasures. Our findings reveal that the exploits heavily rely on a set of nine weaknesses, including unauthorized use of restricted classes and confused deputies in combination with caller-sensitive methods. We further show that all attack vectors implemented by the exploits belong to one of three categories: single-step attacks, restricted-class attacks, and information hiding attacks. The analysis allows us to propose ideas for improving the security architecture to spawn further research in this area.
引用
收藏
页码:779 / 790
页数:12
相关论文
共 50 条
  • [1] An in-depth JAVA']JAVA Teaching Exploration into the Software Engineering Curriculum
    Xu, Qing-Wei
    PROCEEDINGS OF THE 2015 3D INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION AND COMMUNICATION TECHNOLOGY FOR EDUCATION, 2015, 11 : 204 - 206
  • [2] An In-depth Study of Java']Java Deserialization Remote-Code Execution Exploits and Vulnerabilities
    Sayar, Imen
    Bartel, Alexandre
    Bodden, Eric
    Le Traon, Yves
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2023, 32 (01)
  • [3] Java']JavaScript at ten years
    Eich, B
    ACM SIGPLAN NOTICES, 2005, 40 (09) : 129 - 129
  • [4] JS']JShrink: In-Depth Investigation into Debloating Modern Java']Java Applications
    Bruce, Bobby R.
    Zhang, Tianyi
    Arora, Jaspreet
    Xu, Guoqing Harry
    Kim, Miryung
    PROCEEDINGS OF THE 28TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '20), 2020, : 135 - 146
  • [5] Bali, Java']Java and Kawi letters: Translating more than words
    Sears, Laurie J.
    JOURNAL OF SOUTHEAST ASIAN STUDIES, 2022, 53 (1-2) : 353 - 355
  • [6] An In-Depth Analysis of Android's Java']Java Class Library: its Evolution and Security Impact
    Riom, Timothee
    Bartel, Alexandre
    2023 IEEE SECURE DEVELOPMENT CONFERENCE, SECDEV, 2023, : 133 - 144
  • [8] In-depth assessment of snacking behaviour in unmarried adolescent girls 16-19 years of age living in urban centres of Java']Java, Indonesia
    Blum, Lauren S.
    Mellisa, Ayu
    Sari, Eny Kurnia
    Yusadiredja, Isma Novitasari
    van Liere, Marti
    Shulman, Susan
    Izwardy, Doddy
    Menon, Ravi
    Tumilowicz, Alison
    MATERNAL AND CHILD NUTRITION, 2019, 15 (04):
  • [9] ETIOLOGY OF DIARRHEA IN CHILDREN AGED LESS THAN 2 YEARS IN CENTRAL JAVA']JAVA
    SEBODO, T
    SOENARTO, Y
    ROHDE, JE
    RYAN, NJ
    TAYLOR, BJ
    LUKE, RJK
    BISHOP, RF
    BARNES, GL
    HOLMES, IH
    RUCK, BJ
    LANCET, 1977, 1 (8009): : 490 - 491
  • [10] More Common Than You Think: An In-Depth Study of Casual Contributors
    Pinto, Gustavo
    Steinmacher, Igor
    Gerosa, Marco Aurelio
    2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 1, 2016, : 112 - 123