Show simple item record

dc.contributor.authorDietrich, Jen_US
dc.contributor.authorJezek, Ken_US
dc.contributor.authorRasheed, Sen_US
dc.contributor.authorTahir, Aen_US
dc.contributor.authorPotanin, Aen_US
dc.coverage.spatialBarcelona, Spainen_US
dc.date.available2017-05-13en_US
dc.identifierhttp://drops.dagstuhl.de/opus/volltexte/2017/7260/en_US
dc.identifier.citation2017en_US
dc.description.abstractThis artefact demonstrates the effects of the serialisation vulnerabilities described in the companion paper. It is composed of three components: scripts, including source code, for Java, Ruby and C# serialisation-vulnerabilities, two case studies that demonstrate attacks based on the vulnerabilities, and a contracts-based mitigation strategy for serialisation-based attacks on Java applications. The artefact allows users to witness how the serialisation-based vulnerabilities result in behavior that can be used in security attacks. It also supports the repeatability of the case study experiments and the benchmark for the mitigation measures proposed in the paper. Instructions for running the tasks are provided along with a description of the artefact setup.en_US
dc.rights© Jens Dietrich, Kamil Jezek, Shawn Rasheed, Amjed Tahir, and Alex Potanin; licensed under Creative Commons Attribution 3.0 Germany (CC BY 3.0 DE)
dc.titleEvil Pickles: DoS attacks based on object-Graph engineeringen_US
dc.typeArtefact
dc.identifier.elements-id351939
pubs.organisational-group/Massey University
pubs.organisational-group/Massey University/College of Sciences
pubs.organisational-group/Massey University/College of Sciences/School of Engineering and Technology
pubs.organisational-group/Massey University/Other
dc.identifier.harvestedMassey_Dark
pubs.notesNot knownen_US
dc.publisher.urihttp://drops.dagstuhl.de/opus/volltexte/2017/7260/en_US


Files in this item

Icon

This item appears in the following Collection(s)

Show simple item record