Visible to the public An In-Depth Study of More Than Ten Years of Java Exploitation

TitleAn In-Depth Study of More Than Ten Years of Java Exploitation
Publication TypeConference Paper
Year of Publication2016
AuthorsHolzinger, Philipp, Triller, Stefan, Bartel, Alexandre, Bodden, Eric
Conference NameProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4139-4
KeywordsAccess Control, attack vectors, exploits, Human Behavior, java security, pubcrawl, resilience, Scalability, security analysis
AbstractWhen created, the Java platform was among the first runtimes designed with security in mind. Yet, numerous Java versions were shown to contain far-reaching vulnerabilities, permitting denial-of-service attacks or even worse allowing intruders to bypass the runtime's sandbox mechanisms, opening the host system up to many kinds of further attacks. This paper presents a systematic in-depth study of 87 publicly available Java exploits found in the wild. By collecting, minimizing and categorizing those exploits, we identify their commonalities and root causes, with the goal of determining the weak spots in the Java security architecture and possible countermeasures. Our findings reveal that the exploits heavily rely on a set of nine weaknesses, including unauthorized use of restricted classes and confused deputies in combination with caller-sensitive methods. We further show that all attack vectors implemented by the exploits belong to one of three categories: single-step attacks, restricted-class attacks, and information hiding attacks. The analysis allows us to propose ideas for improving the security architecture to spawn further research in this area.
URLhttp://doi.acm.org/10.1145/2976749.2978361
DOI10.1145/2976749.2978361
Citation Keyholzinger_-depth_2016