Umeå University's logo

umu.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (4 of 4) Show all publications
Riom, T., Houy, S., Kreyssig, B. & Bartel, A. (2025). Evaluating the maintainability of forward-porting vulnerabilities in fuzzer benchmarks. In: Proceedings. 2025 IEEE International Conference on Software Maintenance and Evolution,: ICSME 2025. Paper presented at 41st IEEE International Conference on Software Maintenance and Evolution, ICSME 2025, Auckland, New Zealand, September 7-12, 2025 (pp. 1-12). IEEE, Article ID 11185945.
Open this publication in new window or tab >>Evaluating the maintainability of forward-porting vulnerabilities in fuzzer benchmarks
2025 (English)In: Proceedings. 2025 IEEE International Conference on Software Maintenance and Evolution,: ICSME 2025, IEEE, 2025, p. 1-12, article id 11185945Conference paper, Published paper (Refereed)
Abstract [en]

Fuzzing is a well-established technique for detecting bugs and vulnerabilities. With the surge of fuzzers and fuzzer platforms being developed such as AFL and OSSFuzz rises the necessity to benchmark these tools' performance. A common problem is that vulnerability benchmarks are based on bugs in old software releases. For this very reason, Magma introduced the notion of forward-porting to reintroduce vulnerable code in current software releases. While their results are promising, the state-of-the-art lacks an update on the maintainability of this approach over time. Indeed, adding the vulnerable code to a recent software version might either break its functionality or make the vulnerable code no longer reachable. We characterise the challenges with forward-porting by reassessing the portability of Magma's CVEs four years after its release and manually reintroducing the vulnerabilities in the current software versions. We find the straightforward process efficient for 17 of the 32 CVEs in our study. We further investigate why a trivial forward-porting process fails in the 15 other CVEs. This involves identifying the commits breaking the forward-porting process and reverting them in addition to the bug fix. While we manage to complete the process for nine of these CVEs, we provide an update on all 15 and explain the challenges we have been confronted with in this process. Thereby, we give the basis for future work towards a sustainable forward-ported fuzzing benchmark.

Place, publisher, year, edition, pages
IEEE, 2025
Series
Proceedings - Conference on Software Maintenance, ISSN 1063-6773, E-ISSN 2576-3148
National Category
Software Engineering
Identifiers
urn:nbn:se:umu:diva-246995 (URN)10.1109/ICSME64153.2025.00011 (DOI)2-s2.0-105022458364 (Scopus ID)979-8-3315-9587-6 (ISBN)979-8-3315-9588-3 (ISBN)
Conference
41st IEEE International Conference on Software Maintenance and Evolution, ICSME 2025, Auckland, New Zealand, September 7-12, 2025
Funder
The Kempe FoundationsWallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2025-12-03 Created: 2025-12-03 Last updated: 2025-12-03Bibliographically approved
Kreyssig, B., Houy, S., Riom, T. & Bartel, A. (2025). Sleeping giants: activating dormant java deserialization gadget chains through stealthy code changes. In: CCS 2025 - Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security: . Paper presented at 32nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2025, Taipei, Taiwan, October 13-17, 2025. (pp. 2668-2682). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Sleeping giants: activating dormant java deserialization gadget chains through stealthy code changes
2025 (English)In: CCS 2025 - Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery (ACM), 2025, p. 2668-2682Conference paper, Published paper (Refereed)
Abstract [en]

Java deserialization gadget chains are a well-researched critical software weakness. The vast majority of known gadget chains rely on gadgets from software dependencies. Furthermore, it has been shown that small code changes in dependencies have enabled these gadget chains. This makes gadget chain detection a purely reactive endeavor. Even if one dependency's deployment pipeline employs gadget chain detection, a gadget chain can still result from gadgets in other dependencies. In this work, we assess how likely small code changes are to enable a gadget chain. These changes could either be accidental or intentional as part of a supply chain attack. Specifically, we show that class serializability is a strongly fluctuating property over a dependency's evolution. Then, we investigate three change patterns by which an attacker could stealthily introduce gadgets into a dependency. We apply these patterns to 533 dependencies and run three state-of-the-art gadget chain detectors both on the original and the modified dependencies. The tools detect that applying the modification patterns can activate/inject gadget chains in 26.08% of the dependencies we selected. Finally, we verify the newly detected chains. As such, we identify dormant gadget chains in 53 dependencies that could be added through minor code modifications. This both shows that Java deserialization gadget chains are a broad liability to software and proves dormant gadget chains as a lucrative supply chain attack vector.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2025
Keywords
Bug Injection, Dependency, Deserialization, Gadget Chain, Java, Serializable, Software Supply Chain
National Category
Probability Theory and Statistics
Identifiers
urn:nbn:se:umu:diva-247646 (URN)10.1145/3719027.3765031 (DOI)2-s2.0-105023841964 (Scopus ID)9798400715259 (ISBN)
Conference
32nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2025, Taipei, Taiwan, October 13-17, 2025.
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2025-12-19 Created: 2025-12-19 Last updated: 2025-12-19Bibliographically approved
Houy, S., Kreyssig, B., Riom, T., Bartel, A. & McDaniel, P. (2025). SoK: a practical guideline and taxonomy to LLVM’s control flow integrity. In: Proceedings - 2025 IEEE Secure Development Conference, SecDev 2025: . Paper presented at 2025 IEEE Secure Development Conference, SecDev 2025, Indianapolis, IN, USA, 14-16 October, 2025. (pp. 129-141). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>SoK: a practical guideline and taxonomy to LLVM’s control flow integrity
Show others...
2025 (English)In: Proceedings - 2025 IEEE Secure Development Conference, SecDev 2025, Institute of Electrical and Electronics Engineers (IEEE), 2025, p. 129-141Conference paper, Published paper (Refereed)
Abstract [en]

Memory corruption vulnerabilities remain one of the most severe threats to software security. They often allow attackers to achieve arbitrary code execution by redirecting a vulnerable program’s control flow. While Control Flow Integrity (CFI) has gained traction to mitigate this exploitation path, developers are not provided with any direction on how to apply CFI to real-world software. In this work, we establish a taxonomy mapping LLVM’s forward-edge CFI variants to memory corruption vulnerability classes, offering actionable guidance for developers seeking to deploy CFI incrementally in existing codebases. Based on the Top 10 Known Exploited Vulnerabilities (KEV) list, we identify four high-impact vulnerability categories and select one representative CVE for each. We evaluate LLVM’s CFI against each CVE and explain why CFI blocks exploitation in two cases while failing in the other two, illustrating its potential and current limitations. Our findings support informed deployment decisions and provide a foundation for improving the practical use of CFI in production systems.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-248183 (URN)10.1109/SecDev66745.2025.00024 (DOI)2-s2.0-105025202216 (Scopus ID)9798331595951 (ISBN)
Conference
2025 IEEE Secure Development Conference, SecDev 2025, Indianapolis, IN, USA, 14-16 October, 2025.
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2026-01-12 Created: 2026-01-12 Last updated: 2026-01-20Bibliographically approved
Riom, T. & Bartel, A. (2023). An in-depth analysis of Android’s Java class library: its evolution and security impact. In: 2023 IEEE Secure Development Conference (SecDev): . Paper presented at 2023 IEEE Secure Development Conference (SecDev), Atlanta, USA, Octoberr 18-20, 2023 (pp. 133-144). IEEE
Open this publication in new window or tab >>An in-depth analysis of Android’s Java class library: its evolution and security impact
2023 (English)In: 2023 IEEE Secure Development Conference (SecDev), IEEE, 2023, p. 133-144Conference paper, Published paper (Refereed)
Abstract [en]

Android is an operating system widely deployed especially on devices such as smartphones. In this paper, we study the evolution of OpenJDK Java Class Library (JCL) versions used as the basis of the Dalvik Virtual Machine (DVM) and the Android Runtime (ART). We also identify vulnerabilities impacting OpenJDK JCL versions and analyze their impact on Android. Our results indicate that the complexity of the Android JCL code imported from OpenJDK increases because:(1) there is an increase in the number of classes imported from OpenJDK,(2) there is an increase in the fragmentation of the JCL code in Android as code is increasingly imported from multiple OpenJDK versions at the same time, and (3) there is an increase in the distance between the JCL code in Android and OpenJDK as, for instance, Android developer introduce customizations to the imported code. We also observe that most OpenJDK vulnerabilities (80%) are not impacting Android because the vulnerable classes are not imported in Android. Nevertheless, Android does import vulnerable code and little is done to patch this vulnerable code which is only” patched” when a newer version of the vulnerable code is imported. This means that the code can stay vulnerable in Android for years. Most of the vulnerabilities impacting Android (77%) have a security impact on the availability of the system. By developing a proof-of-concept, we show that OpenJDK vulnerabilities imported in Android do have a security impact. We suggest to seriously take into account public information available about OpenJDK vulnerabilities to increase the security of the Android development pipeline.

Place, publisher, year, edition, pages
IEEE, 2023
Keywords
Android, external dependency, vulnerability management, managing code complexity, Java, OpenJDK, Simi- larity Analysis, Vulnerabilities, Security
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:umu:diva-216744 (URN)10.1109/SecDev56634.2023.00028 (DOI)001103219600018 ()2-s2.0-85179181698 (Scopus ID)979-8-3503-3133-2 (ISBN)979-8-3503-3132-5 (ISBN)
Conference
2023 IEEE Secure Development Conference (SecDev), Atlanta, USA, Octoberr 18-20, 2023
Funder
The Kempe FoundationsWallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2023-11-15 Created: 2023-11-15 Last updated: 2025-11-15Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-7486-0538

Search in DiVA

Show all publications