Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Proceedings of ACM on programming languages, 2024-04, Vol.8 (OOPSLA1), p.1125-1153, Article 134
2024

Details

Autor(en) / Beteiligte
Titel
Seneca: Taint-Based Call Graph Construction for Java Object Deserialization
Ist Teil von
  • Proceedings of ACM on programming languages, 2024-04, Vol.8 (OOPSLA1), p.1125-1153, Article 134
Ort / Verlag
New York, NY, USA: ACM
Erscheinungsjahr
2024
Link zum Volltext
Quelle
ACM Digital Library
Beschreibungen/Notizen
  • Object serialization and deserialization are widely used for storing and preserving objects in files, memory, or database as well as for transporting them across machines, enabling remote interaction among processes and many more. This mechanism relies on reflection, a dynamic language that introduces serious challenges for static analyses. Current state-of-the-art call graph construction algorithms do not fully support object serialization/deserialization, i.e., they are unable to uncover the callback methods that are invoked when objects are serialized and deserialized. Since call graphs are a core data structure for multiple types of analysis (e.g., vulnerability detection), an appropriate analysis cannot be performed since the call graph does not capture hidden (vulnerable) paths that occur via callback methods. In this paper, we present Seneca, an approach for handling serialization with improved soundness in the context of call graph construction. Our approach relies on taint analysis and API modeling to construct sound call graphs. We evaluated our approach with respect to soundness, precision, performance, and usefulness in detecting untrusted object deserialization vulnerabilities. Our results show that Seneca can create sound call graphs with respect to serialization features. The resulting call graphs do not incur significant runtime overhead and were shown to be useful for performing identification of vulnerable paths caused by untrusted object deserialization.
Sprache
Englisch
Identifikatoren
ISSN: 2475-1421
eISSN: 2475-1421
DOI: 10.1145/3649851
Titel-ID: cdi_acm_primary_3649851

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX