This is a major development and if you are interested in this type of research, please join in the efforts (Steven is the one that has done most of the research so far, since I've haven't had the time to join in).
The idea is to (somehow) add metadata to the java.lang.String object and allow an App (or APIs) to taint a string (i.e. mark it as 'potentially malicious') and to modify that App/API's behaviour based on tainted information (for example "don't execute an SQL statement if its sql command string is tainted")
Here are the links to the current (as of Dec 2013) posts from Steven starting with the oldest one first (these should give you a good idea of the path he is following):
- Where to start
- Up the ante
- A new approach
- The EVIL bit has been set
- Migration to an easier environment
- Next Steps
One important twist on this idea (which I'm not sure is very clear on Steven's post) is that this technique is currently designed to be used DURING TEST (i.e. not on live production websites). The idea is to 'patch' the JVM before the unit tests are executed and use the EVIL bit to detect vulnerabilities in applications (without touching the code under test)