[HTML][HTML] Bridging the gap: A survey and classification of research-informed ethical hacking tools

P Modesti, L Golightly, L Holmes, C Opara… - Journal of Cybersecurity …, 2024 - mdpi.com
The majority of Ethical Hacking (EH) tools utilised in penetration testing are developed by
practitioners within the industry or underground communities. Similarly, academic …

Oddfuzz: Discovering java deserialization vulnerabilities via structure-aware directed greybox fuzzing

S Cao, B He, X Sun, Y Ouyang, C Zhang… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Java deserialization vulnerability is a severe threat in practice. Researchers have proposed
static analysis solutions to locate candidate vulnerabilities and fuzzing solutions to generate …

Silent spring: Prototype pollution leads to remote code execution in Node. js

M Shcherbakov, M Balliu, CA Staicu - 32nd USENIX Security Symposium …, 2023 - usenix.org
Prototype pollution is a dangerous vulnerability affecting prototype-based languages like
JavaScript and the Node. js platform. It refers to the ability of an attacker to inject properties …

Improving java deserialization gadget chain mining via overriding-guided object generation

S Cao, X Sun, X Wu, L Bo, B Li, R Wu… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Java (de) serialization is prone to causing security-critical vulnerabilities that attackers can
invoke existing methods (gadgets) on the application's classpath to construct a gadget chain …

An in-depth study of java deserialization remote-code execution exploits and vulnerabilities

I Sayar, A Bartel, E Bodden, Y Le Traon - ACM Transactions on Software …, 2023 - dl.acm.org
Nowadays, an increasing number of applications use deserialization. This technique, based
on rebuilding the instance of objects from serialized byte streams, can be dangerous since it …

{FUGIO}: Automatic exploit generation for {PHP} object injection vulnerabilities

S Park, D Kim, S Jana, S Son - 31st USENIX Security Symposium …, 2022 - usenix.org
A PHP object injection (POI) vulnerability is a security-critical bug that allows the remote
code execution of class methods existing in a vulnerable PHP application. Exploiting this …

Undefined-oriented programming: Detecting and chaining prototype pollution gadgets in node. js template engines for malicious consequences

Z Liu, K An, Y Cao - 2024 IEEE Symposium on Security and …, 2024 - ieeexplore.ieee.org
Prototype pollution is a type of recently-discovered, impactful vulnerability that affects
JavaScript code. One important yet challenging research problem of prototype pollution is …

Efficient detection of java deserialization gadget chains via bottom-up gadget search and dataflow-aided payload construction

B Chen, L Zhang, X Huang, Y Cao… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Java Object Injection (JOI) is a severe type of vulnerability affecting Java deserialization,
which allows adversaries to inject a well-crafted, serialized object, thus triggering a series of …

URadar: discovering unrestricted file upload vulnerabilities via adaptive dynamic testing

Y Chen, Y Li, Z Pan, Y Lu, J Chen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Unrestricted file upload (UFU) vulnerabilities, especially unrestricted executable file upload
(UEFU) vulnerabilities, pose severe security risks to web servers. For instance, attackers can …

Seneca: Taint-based call graph construction for java object deserialization

JCS Santos, M Mirakhorli, A Shokri - Proceedings of the ACM on …, 2024 - dl.acm.org
Object serialization and deserialization are widely used for storing and preserving objects in
files, memory, or database as well as for transporting them across machines, enabling …