Java deserialization gadget chain discovery method based on hybrid analysis
Java deserialization vulnerabilities have become a common threat to Java application security nowadays.Finding out the gadget chain determines whether this type of vulnerability can be exploited.Due to the large code space of Java applications and dependent libraries and the polymorphism of Java its...
Saved in:
Main Authors: | Yongxing WU, Libo CHEN, Kaida JIANG |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2022-04-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022009 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Java deserialization vulnerability defense technologybased on run-time detection
by: LI Yulin, et al.
Published: (2024-04-01) -
Binary program taint analysis optimization method based on function summary
by: Pan YANG, et al.
Published: (2023-04-01) -
Automatic exploitation generation method of write-what-where vulnerability
by: Huafeng HUANG, et al.
Published: (2022-01-01) -
Attack signature generation by traceable dynamic taint analysis
by: Yu LIU, et al.
Published: (2012-05-01) -
Protocol format extraction at semantic level
by: Zheng HONG, et al.
Published: (2013-10-01)