Umeå University's logo

umu.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Sleeping giants: activating dormant java deserialization gadget chains through stealthy code changes
Umeå University, Faculty of Science and Technology, Department of Computing Science.
Umeå University, Faculty of Science and Technology, Department of Computing Science.
Umeå University, Faculty of Science and Technology, Department of Computing Science.ORCID iD: 0000-0001-7486-0538
Umeå University, Faculty of Science and Technology, Department of Computing Science.ORCID iD: 0000-0003-1383-0372
2025 (English)In: CCS 2025 - Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery (ACM), 2025, p. 2668-2682Conference paper, Published paper (Refereed)
Abstract [en]

Java deserialization gadget chains are a well-researched critical software weakness. The vast majority of known gadget chains rely on gadgets from software dependencies. Furthermore, it has been shown that small code changes in dependencies have enabled these gadget chains. This makes gadget chain detection a purely reactive endeavor. Even if one dependency's deployment pipeline employs gadget chain detection, a gadget chain can still result from gadgets in other dependencies. In this work, we assess how likely small code changes are to enable a gadget chain. These changes could either be accidental or intentional as part of a supply chain attack. Specifically, we show that class serializability is a strongly fluctuating property over a dependency's evolution. Then, we investigate three change patterns by which an attacker could stealthily introduce gadgets into a dependency. We apply these patterns to 533 dependencies and run three state-of-the-art gadget chain detectors both on the original and the modified dependencies. The tools detect that applying the modification patterns can activate/inject gadget chains in 26.08% of the dependencies we selected. Finally, we verify the newly detected chains. As such, we identify dormant gadget chains in 53 dependencies that could be added through minor code modifications. This both shows that Java deserialization gadget chains are a broad liability to software and proves dormant gadget chains as a lucrative supply chain attack vector.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2025. p. 2668-2682
Keywords [en]
Bug Injection, Dependency, Deserialization, Gadget Chain, Java, Serializable, Software Supply Chain
National Category
Probability Theory and Statistics
Identifiers
URN: urn:nbn:se:umu:diva-247646DOI: 10.1145/3719027.3765031Scopus ID: 2-s2.0-105023841964ISBN: 9798400715259 (electronic)OAI: oai:DiVA.org:umu-247646DiVA, id: diva2:2023308
Conference
32nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2025, Taipei, Taiwan, October 13-17, 2025.
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)Available from: 2025-12-19 Created: 2025-12-19 Last updated: 2025-12-19Bibliographically approved

Open Access in DiVA

fulltext(1906 kB)176 downloads
File information
File name FULLTEXT01.pdfFile size 1906 kBChecksum SHA-512
58220b49c6297d06cbf91b857dc60bdbe2a425352c35da39d97fcafb47af1db578fa48b05ca3371c228462f08fe78ac55759c692ae70f61294f720cf1b6a3a28
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Kreyssig, BrunoHouy, SabineRiom, TimothéeBartel, Alexandre

Search in DiVA

By author/editor
Kreyssig, BrunoHouy, SabineRiom, TimothéeBartel, Alexandre
By organisation
Department of Computing Science
Probability Theory and Statistics

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 435 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf