Aug. 18, 2022, 1:20 a.m. | Imen Sayar (IRIT), Alexandre Bartel, Eric Bodden, Yves Le Traon

cs.CR updates on arXiv.org arxiv.org

Nowadays, an increasing number of applications uses deserialization. This
technique, based on rebuilding the instance of objects from serialized byte
streams, can be dangerous since it can open the application to attacks such as
remote code execution (RCE) if the data to deserialize is originating from an
untrusted source. Deserialization vulnerabilities are so critical that they are
in OWASP's list of top 10 security risks for web applications. This is mainly
caused by faults in the development process of applications …

code code execution deserialization exploits exploits and vulnerabilities java study vulnerabilities

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Engineer 2

@ Oracle | BENGALURU, KARNATAKA, India

Oracle EBS DevSecOps Developer

@ Accenture Federal Services | Arlington, VA

Information Security GRC Specialist - Risk Program Lead

@ Western Digital | Irvine, CA, United States

Senior Cyber Operations Planner (15.09)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

AI Cybersecurity Architect

@ FactSet | India, Hyderabad, DVS, SEZ-1 – Orion B4; FL 7,8,9,11 (Hyderabad - Divyasree 3)