Java deserialization vulnerability defense technologybased on run-time detection
The discovery of deserialization vulnerabilities has garnered significant attention from cybersecurity researchers, with an increasing number of vulnerabilities being uncovered, posing severe threats to enterprise network security. The Java language's polymorphism and reflection capabilities re...
Saved in:
Main Authors: | LI Yulin, CHEN Libo, LIU Yujiang, DU Wenlong, XUE Zhi |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2024-04-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024021 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Java deserialization gadget chain discovery method based on hybrid analysis
by: Yongxing WU, et al.
Published: (2022-04-01) -
Safeguarding Zoning and Vulnerability in Ahvaz City from the Passive Defense Perspective
by: Sohrab Amirian, et al.
Published: (2020-03-01) -
Assessment the Vulnerability of Infrastructures in Ardabil City
in terms of passive defense
by: Mohammad Hasan Yazdani, et al.
Published: (2017-03-01) -
Assessment of physical-economic and environmental factors affecting urban Space vulnerability analysis in earthquake Enjoying passive defense( Case study: Area5 shahre rey,district 20 tehran )
by: Masumeh Mohebati, et al.
Published: (2022-06-01) -
Vulnerability Testing and Analysis on Websites and Web-Based Applications in the XYZ Faculty Environment Using Acunetix Vulnerability
by: Mifthahul Rahmi, et al.
Published: (2024-12-01)