Evil Pickles: DoS Attacks Based on Object-Graph Engineering (Artifact)

Date

Authors

Dietrich, Jens
Jezek, Kamil
Rasheed, Shawn
Tahir, Amjed
Potanin, Alex

Journal Title

Journal ISSN

Volume Title

Publisher

Access Statement

Research Projects

Organizational Units

Journal Issue

Abstract

This artefact demonstrates the effects of the serialisation vulnerabilities described in the companion paper. It is composed of three components: scripts, including source code, for Java, Ruby and C# serialisation-vulnerabilities, two case studies that demonstrate attacks based on the vulnerabilities, and a contracts-based mitigation strategy for serialisation-based attacks on Java applications. The artefact allows users to witness how the serialisation-based vulnerabilities result in behavior that can be used in security attacks. It also supports the repeatability of the case study experiments and the benchmark for the mitigation measures proposed in the paper. Instructions for running the tasks are provided along with a description of the artefact setup.

Description

Keywords

Citation

Source

Dagstuhl Artifacts Series (DARTS)

Book Title

Entity type

Publication

Access Statement

License Rights

Restricted until