Jadeite: a novel image-behavior-based approach for java malware detection using deep learning

I Obaidat, M Sridhar, KM Pham, PH Phung - Computers & Security, 2022 - Elsevier
Java malware exploiting language vulnerabilities has become increasingly prevalent in the
recent past. Since Java is a platform-independent language, these security threats open up …

An in-depth study of java deserialization remote-code execution exploits and vulnerabilities

I Sayar, A Bartel, E Bodden, Y Le Traon - ACM Transactions on Software …, 2023 - dl.acm.org
Nowadays, an increasing number of applications use deserialization. This technique, based
on rebuilding the instance of objects from serialized byte streams, can be dangerous since it …

Static data-flow analysis for software product lines in C: Revoking the preprocessor's special role

PD Schubert, P Gazzillo, Z Patterson, J Braha… - Automated Software …, 2022 - Springer
Many critical codebases are written in C, and most of them use preprocessor directives to
encode variability, effectively encoding software product lines. These preprocessor …

Lossless, persisted summarization of static callgraph, points-to and data-flow analysis

PD Schubert, B Hermann… - 35th European Conference …, 2021 - drops.dagstuhl.de
Static analysis is used to automatically detect bugs and security breaches, and aids compiler
optimization. Whole-program analysis (WPA) can yield high precision, however causes long …

BejaGNN: behavior-based Java malware detection via graph neural network

P Feng, L Yang, D Lu, N Xi, J Ma - The Journal of Supercomputing, 2023 - Springer
As a popular platform-independent language, Java is widely used in enterprise applications.
In the past few years, language vulnerabilities exploited by Java malware have become …

The soot-based toolchain for analyzing android apps

S Arzt, S Rasthofer, E Bodden - 2017 IEEE/ACM 4th …, 2017 - ieeexplore.ieee.org
Due to the quality and security requirements that come with an always-on mobile device
processing large amounts of highly sensitive information, Android apps are an important …

Privilege-escalation vulnerability discovery for large-scale RPC services: Principle, design, and deployment

Z Liu, H Zhao, S Li, Q Li, T Wei, Y Wang - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
RPCs are fundamental to our large-scale distributed system. From a security perspective,
the blast radius of RPCs is worryingly big since each RPC often interacts with tens of internal …

A Systematic Hardening of Java's Information Hiding

P Holzinger, E Bodden - … of the 2021 International Symposium on …, 2021 - dl.acm.org
The Java runtime is installed on billions of devices worldwide, and over years it has been a
primary attack vector for online criminals. In this work, we address that many attack vectors …

RIM4J: An Architecture for Language-Supported Runtime Measurement against Malicious Bytecode in Cloud Computing

H Ba, H Zhou, H Qiao, Z Wang, J Ren - Symmetry, 2018 - mdpi.com
While cloud customers can benefit from migrating applications to the cloud, they are
concerned about the security of the hosted applications. This is complicated by the …

Implementation of a general reduced TCP/IP protocol stack for embedded web server

CS Zhou, F Chong - Third International Conference on …, 2007 - ieeexplore.ieee.org
The embedded web server technologies are based on Internet browser to provide flexible
remote device monitoring and management, and it has become an advanced development …