Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis
Traditional static taint analysis based on bytecode analysis such as GadgetInspector to detect deserialization vulnerabilities always faced precision problems. For example, missing the fact that taints flowing to members in called methods, type confusion, and chaotic inheritance relationships when d...
Saved in:
Published in | IEEE/ACM ... International Symposium on Quality of Service (Online) pp. 1 - 2 |
---|---|
Main Authors | , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
19.06.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Traditional static taint analysis based on bytecode analysis such as GadgetInspector to detect deserialization vulnerabilities always faced precision problems. For example, missing the fact that taints flowing to members in called methods, type confusion, and chaotic inheritance relationships when detecting deserialization vulnerabilities, which would lead to many error results. To alleviate these problems, this paper considers three measures of improving precision of detecting deserialization vulnerabilities, including cross-function members data flow tracking, local variables and arguments types inference, and call chain subject inference based on inheritance relationships. |
---|---|
ISSN: | 2766-8568 |
DOI: | 10.1109/IWQoS57198.2023.10188756 |