Attack and Defense Labs

Displaying 1-1 of 1 results

  • White Papers // Apr 2010

    Attacking JAVA Serialized Communication

    Many applications written in JAVA make use of Object Serialization to transfer full blown objects across the network via byte streams or to store them on the file system. How Object Serialization works is beyond the scope of this whitepaper. To understand the Serialization of objects and details of the...

    Provided By Attack and Defense Labs

  • White Papers // Apr 2010

    Attacking JAVA Serialized Communication

    Many applications written in JAVA make use of Object Serialization to transfer full blown objects across the network via byte streams or to store them on the file system. How Object Serialization works is beyond the scope of this whitepaper. To understand the Serialization of objects and details of the...

    Provided By Attack and Defense Labs