Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. CRYSTALLIZER: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization Vulnerabilities
 
conference paper

CRYSTALLIZER: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization Vulnerabilities

Srivastava, Prashast
•
Toffalini, Flavio  
•
Vorobyov, Kostyantyn
Show more
Chandra, S
•
Blincoe, K
Show more
January 1, 2023
Proceedings Of The 31St Acm Joint Meeting European Software Engineering Conference And Symposium On The Foundations Of Software Engineering, Esec/Fse 2023
31st ACM Joint Meeting of the European Software Engineering Conference / Symposium on the Foundations-of-Software-Engineering (ESEC/FSE)

Applications use serialization and deserialization to exchange data. Serialization allows developers to exchange messages or perform remote method invocation in distributed applications. However, the application logic itself is responsible for security. Adversaries may abuse bugs in the deserialization logic to forcibly invoke attacker-controlled methods by crafting malicious bytestreams (payloads).|CRYSTALLIZER presents a novel hybrid framework to automatically uncover deserialization vulnerabilities by combining static and dynamic analyses. Our intuition is to first over-approximate possible payloads through static analysis (to constrain the search space). Then, we use dynamic analysis to instantiate concrete payloads as a proof-of-concept of a vulnerability (giving the analyst concrete examples of possible attacks). Our proof-of-concept focuses on Java deserialization as the imminent domain of such attacks.|We evaluate our prototype on seven popular Java libraries against state-of-the-art frameworks for uncovering gadget chains. In contrast to existing tools, we uncovered 41 previously unknown exploitable chains. Furthermore, we show the real-world security impact of CRYSTALLIZER by using it to synthesize gadget chains to mount RCE and DoS attacks on three popular Java applications. We have responsibly disclosed all newly discovered vulnerabilities.

  • Details
  • Metrics
Type
conference paper
DOI
10.1145/3611643.3616313
Web of Science ID

WOS:001148157800127

Author(s)
Srivastava, Prashast
Toffalini, Flavio  
Vorobyov, Kostyantyn
Gauthier, Francois
Bianchi, Antonio
Payer, Mathias  
Editors
Chandra, S
•
Blincoe, K
•
Tonella, P
Date Issued

2023-01-01

Publisher

Assoc Computing Machinery

Publisher place

New York

Published in
Proceedings Of The 31St Acm Joint Meeting European Software Engineering Conference And Symposium On The Foundations Of Software Engineering, Esec/Fse 2023
ISBN of the book

979-8-4007-0327-0

Start page

1586

End page

1597

Subjects

Technology

•

Deserialization Vulnerabiltiies

•

Java

•

Hybrid Analysis

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
HEXHIVE  
Event nameEvent placeEvent date
31st ACM Joint Meeting of the European Software Engineering Conference / Symposium on the Foundations-of-Software-Engineering (ESEC/FSE)

San Francisco, CA

DEC 03-09, 2023

FunderGrant Number

European Research Council (ERC) under the European Union

850868

AFRL

FA8655-20-1-7048

SNSF

PCEGP2_186974

Available on Infoscience
February 23, 2024
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/205356
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés