{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:20:42Z","timestamp":1775470842607,"version":"3.50.1"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031535543","type":"print"},{"value":"9783031535550","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53555-0_22","type":"book-chapter","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T05:02:10Z","timestamp":1707800530000},"page":"229-240","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Rev Gadget: A Java Deserialization Gadget Chains Discover Tool Based on\u00a0Reverse Semantics and\u00a0Taint Analysis"],"prefix":"10.1007","author":[{"given":"Yifan","family":"Luo","sequence":"first","affiliation":[]},{"given":"Baojiang","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,14]]},"reference":[{"key":"22_CR1","unstructured":"CVE-2016-4437. http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-4437"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Cao, S., et al.: Improving java deserialization gadget chain mining via overriding-guided object generation (2023). arXiv preprint arXiv:2303.07593","DOI":"10.1109\/ICSE48619.2023.00044"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Cao, S., et al.: ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing (2023). arXiv preprint arXiv:2304.04233","DOI":"10.1109\/SP46215.2023.10179377"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Chen, X., Wang, B., Jin, Z., Feng, Y., Li, X., Feng, X., Liu, Q.: Tabby: automated gadget chain detection for java deserialization vulnerabilities. In: 2023 53rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 179\u2013192. IEEE, June 2023","DOI":"10.1109\/DSN58367.2023.00028"},{"key":"22_CR5","unstructured":"GitHub. (2023). CodeQL. GitHub. Retrieved November 14, 2023. https:\/\/github.com\/github\/codeql"},{"key":"22_CR6","unstructured":"Google. syzkaller. GitHub. Retrieved November 13, 2023 (2023). https:\/\/github.com\/google\/syzkaller"},{"key":"22_CR7","unstructured":"Google. American Fuzzy Lop. GitHub. Retrieved Month Day, Year (2021). https:\/\/github.com\/google\/AFL"},{"key":"22_CR8","unstructured":"Livshits, V.B., Lam, M.S.: Finding security vulnerabilities in Java applications with static analysis. In: USENIX Security Symposium, vol. 14, pp. 18, August 2005"},{"key":"22_CR9","unstructured":"Neo4j: Neo4j Graph Database. Retrieved November 14, 2023, (2023). https:\/\/neo4j.com\/"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Padhye, R., Lemieux, C., Sen, K.: JQF: coverage-guided property-based testing in Java. In Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 398\u2013401, July 2019","DOI":"10.1145\/3293882.3339002"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Rasheed, S., Dietrich, J.: A hybrid analysis to detect Java serialisation vulnerabilities. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1209\u20131213, December 2020","DOI":"10.1145\/3324884.3418931"},{"key":"22_CR12","unstructured":"Soot-oss. Soot: A Java Optimization Framework. GitHub (2023). https:\/\/github.com\/soot-oss\/soot"},{"key":"22_CR13","unstructured":"wh1t3p1g. Tabby: A Cat-Inspired Terminal App with Advanced Features. GitHub (2023). https:\/\/github.com\/wh1t3p1g\/tabby"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internet, Data &amp; Web Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53555-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T05:06:43Z","timestamp":1707800803000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53555-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031535543","9783031535550"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53555-0_22","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"14 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EIDWT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Emerging Internet, Data & Web Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Naples","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 February 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 February 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eidwt12024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/eidwt\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}