Evil Pickles: DoS attacks based on object-Graph engineering

dc.contributor.authorDietrich J
dc.contributor.authorJezek K
dc.contributor.authorRasheed S
dc.contributor.authorTahir A
dc.contributor.authorPotanin A
dc.coverage.spatialBarcelona, Spain
dc.date.available13/05/2017
dc.date.issued13/05/2017
dc.description.abstractThis artefact demonstrates the effects of the serialisation vulnerabilities described in the companion paper. It is composed of three components: scripts, including source code, for Java, Ruby and C# serialisation-vulnerabilities, two case studies that demonstrate attacks based on the vulnerabilities, and a contracts-based mitigation strategy for serialisation-based attacks on Java applications. The artefact allows users to witness how the serialisation-based vulnerabilities result in behavior that can be used in security attacks. It also supports the repeatability of the case study experiments and the benchmark for the mitigation measures proposed in the paper. Instructions for running the tasks are provided along with a description of the artefact setup.
dc.identifierhttp://drops.dagstuhl.de/opus/volltexte/2017/7260/
dc.identifier.citation2017
dc.identifier.elements-id351939
dc.identifier.harvestedMassey_Dark
dc.identifier.urihttps://hdl.handle.net/10179/11358
dc.publisher.urihttp://drops.dagstuhl.de/opus/volltexte/2017/7260/
dc.titleEvil Pickles: DoS attacks based on object-Graph engineering
dc.typeother
pubs.notesNot known
pubs.organisational-group/Massey University
pubs.organisational-group/Massey University/College of Sciences
pubs.organisational-group/Massey University/College of Sciences/School of Engineering and Technology
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
DARTS-3-2-13.pdf
Size:
394.4 KB
Format:
Adobe Portable Document Format
Description: