2023 IEEE Symposium on Security and Privacy (SP) 2023
DOI: 10.1109/sp46215.2023.10179377
|View full text |Cite
|
Sign up to set email alerts
|

ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…Automated deserialization exploit generation Automatically generating payloads for exploiting deserialization vulnerabilities has been explored by several works. Cao et al suggested ODDFUZZ [9] for using structured information for generating POP exploits for Java projects with deserialization vulnerabilities. ysoserial [15] is a tool that generates exploit objects using known POP gadgets in specific Java applications.…”
Section: Related Workmentioning
confidence: 99%
“…Automated deserialization exploit generation Automatically generating payloads for exploiting deserialization vulnerabilities has been explored by several works. Cao et al suggested ODDFUZZ [9] for using structured information for generating POP exploits for Java projects with deserialization vulnerabilities. ysoserial [15] is a tool that generates exploit objects using known POP gadgets in specific Java applications.…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, some inadequacies persist [13,[21][22][23][24][25]. Firstly, while some fuzzers provide more accurate definitions for distance metrics, they neglect the fact that distinct branches may have varying arrival probabilities in certain situations.…”
Section: Introductionmentioning
confidence: 99%