Confine: Automated system call policy generation for container attack surface reduction

S Ghavamnia, T Palit, A Benameur… - … on Research in Attacks …, 2020 - usenix.org
Reducing the attack surface of the OS kernel is a promising defense-in-depth approach for
mitigating the fragile isolation guarantees of container environments. In contrast to …

Temporal system call specialization for attack surface reduction

S Ghavamnia, T Palit, S Mishra… - 29th USENIX Security …, 2020 - usenix.org
Attack surface reduction through the removal of unnecessary application features and code
is a promising technique for improving security without incurring any additional overhead …

FaaSLight: General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing

X Liu, J Wen, Z Chen, D Li, J Chen, Y Liu… - ACM Transactions on …, 2023 - dl.acm.org
Serverless computing is a popular cloud computing paradigm that frees developers from
server management. Function-as-a-Service (FaaS) is the most popular implementation of …

Oddfuzz: Discovering java deserialization vulnerabilities via structure-aware directed greybox fuzzing

S Cao, B He, X Sun, Y Ouyang, C Zhang… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Java deserialization vulnerability is a severe threat in practice. Researchers have proposed
static analysis solutions to locate candidate vulnerabilities and fuzzing solutions to generate …

A comprehensive study of bloated dependencies in the maven ecosystem

C Soto-Valero, N Harrand, M Monperrus… - Empirical Software …, 2021 - Springer
Build automation tools and package managers have a profound influence on software
development. They facilitate the reuse of third-party libraries, support a clear separation …

Improving java deserialization gadget chain mining via overriding-guided object generation

S Cao, X Sun, X Wu, L Bo, B Li, R Wu… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Java (de) serialization is prone to causing security-critical vulnerabilities that attackers can
invoke existing methods (gadgets) on the application's classpath to construct a gadget chain …

A longitudinal analysis of bloated java dependencies

C Soto-Valero, T Durieux, B Baudry - Proceedings of the 29th ACM Joint …, 2021 - dl.acm.org
We study the evolution and impact of bloated dependencies in a single software ecosystem:
Java/Maven. Bloated dependencies are third-party libraries that are packaged in the …

Mininode: Reducing the attack surface of node. js applications

I Koishybayev, A Kapravelos - … on Research in Attacks, Intrusions and …, 2020 - usenix.org
JavaScript has gained traction as a programming language that qualifies for both the client-
side and the server-side logic of applications. A new ecosystem of server-side code written …

Jack-in-the-box: An empirical study of javascript bundling on the web and its security implications

J Rack, CA Staicu - Proceedings of the 2023 ACM SIGSAC Conference …, 2023 - dl.acm.org
In recent years, we have seen an increased interest in studying the software supply chain of
user-facing applications to uncover problematic third-party dependencies. Prior work shows …

Automating seccomp filter generation for linux applications

C Canella, M Werner, D Gruss, M Schwarz - Proceedings of the 2021 on …, 2021 - dl.acm.org
Software vulnerabilities undermine the security of applications. By blocking unused
functionality, the impact of potential exploits can be reduced. While seccomp provides a …