Java deserialization vulnerability defense technologybased on run-time detection
The discovery of deserialization vulnerabilities has garnered significant attention from cybersecurity researchers, with an increasing number of vulnerabilities being uncovered, posing severe threats to enterprise network security. The Java language's polymorphism and reflection capabilities re...
Saved in:
| Main Authors: | LI Yulin, CHEN Libo, LIU Yujiang, DU Wenlong, XUE Zhi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2024-04-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024021 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A fast-running engineering tool for assessing structural vulnerability to blast loading
by: Carlo Crispino, et al.
Published: (2025-04-01) -
Assessment of physical-economic and environmental factors affecting urban Space vulnerability analysis in earthquake Enjoying passive defense( Case study: Area5 shahre rey,district 20 tehran )
by: Masumeh Mohebati, et al.
Published: (2022-06-01) -
Vulnerability Testing and Analysis on Websites and Web-Based Applications in the XYZ Faculty Environment Using Acunetix Vulnerability
by: Mifthahul Rahmi, et al.
Published: (2024-12-01) -
Research on key technology of vulnerability threat classification
by: Qi-xu LIU, et al.
Published: (2012-09-01) -
Vulnerability and Vulnerance: Marginalization of Women in 1 Timothy 2:12-15
by: Daniel Fajar Panuntun, et al.
Published: (2024-07-01)