Analysis of Zero-Day Vulnerabilities in Java
Keywords:
Zero-Day Vulnerability, Security Exploit, Threat IntelligenceAbstract
The zero-day vulnerability is a security lack of the computer system that is unknown to software vendor. This kind of vulnerability permits building attack strategies for gaining the access to the resources and data of a computer system. The main issue of the topic is how a computer system can be protected by zero-day vulnerabilities using the actual security procedures and tools for identifying the potential attacks that exploit the vulnerabilities unknown to computer users and software providers. The paper highlights the main features of such kind of vulnerabilities, some exploitation methods and examples of them for Java zero-day vulnerabilities and how protection strategies can be built on intelligence extracted from attack anatomy analysis.References
Felician Alecu, Paul Pocatilu, George Stoica, Cristian Ciurea, Sergiu Capisizu, OpenID, a Single Sign-On Solution for E-learning Applications, Journal of Mobile, Embedded and Distributed Systems, vol. 3, no. 3, 2011, pp. 136 – 141
Leyla Bilge, Tudor Dumitras, Before We Knew It: An Empirical Study of Zero-Day Attacks in The Real World, Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, USA, Oct. 16-18, 2012, pp. 833 – 844
Cătălin Boja, Security Survey of Internet Browsers Data Managers, Journal of Mobile, Embedded and Distributed Systems, vol. 3, no. 3, 2011, pp. 109 – 119
Mike Cloppert, Security Intelligence: Attacking the Cyber Kill Chain, SANS Computer Forensics, October 14, 2009, http://computer-forensics.sans.org/blog/2009/10/14/security-intelligence-attacking-the-kill-chain/
Mike Cloppert, Security Intelligence: Defining APT Campaigns, SANS Computer Forensics, June 21, 2010, http://computer-forensics.sans.org/blog/2010/06/21/security-intelligence-knowing-enemy/
Jan Henrik, New 0-day vulnerability in Java JRE 1.7.0 Update 15 and 1.6.0 Update 41 is being exploited in the wild, March 1, 2013, http://www.mnemonic.no/en/Andre-sprak/English/Blog/java-vuln-1march-2013/
Ion Ivan, Dragoş Palaghiţă, Sorin Vînturiş, Mihai Doinea, Vulnerability Analysis in Web Distributed Applications, Journal of Mobile, Embedded and Distributed Systems, vol. 3, no. 1, 2011, pp. 1 – 9
Darien Kindlund, Yichong Lin, YAJ0: Yet Another Java Zero-Day, February 28, 2013 http://www.fireeye.com/blog/technical/cyber-exploits/2013/02/yaj0-yet-another-java-zero-day-2.html
Paul Pocatilu, Android Applications Security, Informatica Economică, vol. 15, no. 3, 2011, pp. 163 – 171
Marius Popa, Binary Code Disassembly for Reverse Engineering, Journal of Mobile, Embedded and Distributed Systems, vol. 4, no. 4, 2012, pp. 233 – 248
Marius Popa, Characteristics of Program Code Obfuscation for Reverse Engineering of Software, Proceedings of the 4th International Conference on Security for Information Technology and Communications, 2011, ASE Publishing House, Bucharest, pp. 103 – 112
Marius Popa, Techniques of Program Code Obfuscation for Secure Software, Journal of Mobile, Embedded and Distributed Systems, vol. 3, no. 4, 2011, pp. 205 – 219
Marius Popa, Using the Disassembly of Binary Executables in Reverse Engineering of Software, Proceedings of the 5th International Conference on Security for Information Technology and Communications, 2012, ASE Publishing House, Bucharest, pp. 7 – 17
Cristian Toma, Security Issues for 2D Barcodes Ticketing Systems, Journal of Mobile, Embedded and Distributed Systems, vol. 3, no. 1, 2011, pp. 34 – 53
Latest Java Zero-Day Shares Connections with Bit9 Security Incident, Symantec, March 1, 2013, http://www.symantec.com/connect/blogs/latest-java-zero-day-shares-connections-bit9-security-incident
http://www.cert.org/blogs/certcc/2013/01/anatomy_of_java_exploits.html
http://www.cs.rit.edu/usr/local/pub/swm/jdoc7/com/sun/jmx/mbeanserver/package-summary.html
http://cve.mitre.org/about/index.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1493
http://cwe.mitre.org/data/definitions/119.html
http://cwe.mitre.org/data/definitions/264.html
http://docs.oracle.com/javase/7/docs/api
http://en.wikipedia.org/wiki/Zero-day_attack
https://partners.immunityinc.com/idocs/Java%20MBeanInstantiator.findClass%200day%20Analysis.pdf
http://www.cvedetails.com/cve-details.php?cve_id=CVE-2013-0422
http://www.cvedetails.com/cve/CVE-2013-1493/
http://www.pctools.com/security-news/zero-day-vulnerability/?goback=%2Egna_38412
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The author(s) is responsible for the correctness and legality of the paper content.
- Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.
- It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.
- The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.
JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at http://jmeds.eu.
Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice.