International audienceOpen-source software supply chain attacks aim at infecting downstream users by poisoning open-source packages. The common way of consuming such artifacts is through package repositories and the development of vetting strategies to detect such attacks is ongoing research. Despite its popularity, the Java ecosystem is the less explored one in the context of supply chain attacks. In this paper, we present simple-yet-effective indicators of malicious behavior that can be observed statically through the analysis of Java bytecode. Then we evaluate how such indicators and their combinations perform when detecting malicious code injections. We do so by injecting three malicious payloads taken from realworld examples into the T...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...
The most dangerous security-related software errors, according to CWE 2011, are those leading to inj...
When created, the Java platform was among the first runtimes designed with security in mind. Yet, nu...
International audienceOpen-source software supply chain attacks aim at infecting downstream users by...
International audienceOpen-source software supply chain attacks aim at infecting downstream users by...
International audienceOpen-source software supply chain attacks aim at infecting downstream users by...
International audienceOpen-source software supply chain attacks aim at infecting downstream users by...
Open-source software supply chain attacks aim at infecting downstream users by poisoning open-source...
The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affec...
The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affec...
The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affec...
Malicious Java applets are widely used to deliver malicious software to remote systems. In this work...
Abstract Extensible component-based platforms al-low dynamic discovery, installation and execution o...
AbstractCode obfuscation was introduced as a viable technique to prevent reverse engineering of soft...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...
The most dangerous security-related software errors, according to CWE 2011, are those leading to inj...
When created, the Java platform was among the first runtimes designed with security in mind. Yet, nu...
International audienceOpen-source software supply chain attacks aim at infecting downstream users by...
International audienceOpen-source software supply chain attacks aim at infecting downstream users by...
International audienceOpen-source software supply chain attacks aim at infecting downstream users by...
International audienceOpen-source software supply chain attacks aim at infecting downstream users by...
Open-source software supply chain attacks aim at infecting downstream users by poisoning open-source...
The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affec...
The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affec...
The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affec...
Malicious Java applets are widely used to deliver malicious software to remote systems. In this work...
Abstract Extensible component-based platforms al-low dynamic discovery, installation and execution o...
AbstractCode obfuscation was introduced as a viable technique to prevent reverse engineering of soft...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...
The most dangerous security-related software errors, according to CWE 2011, are those leading to inj...
When created, the Java platform was among the first runtimes designed with security in mind. Yet, nu...