On 01/05/2015 03:17 PM, David M. Lloyd wrote:
Would something like this prevent Finalizer attacks?

- leave finalization registration the way it is (at object allocation
time).

This was written incorrectly: "after Object default constructor completes"

- provide internal API with which a previously registered object can be
de-registered
- deserialization infrastructure de-registers the instances that fail
deserialization

How about simply forbidding classes with finalizers from being serialized or deserialized with this mechanism? Finalizers never really work the way you want anyway.

Seems a better option than essentially doubling (or more) the end-user complexity to me.

This is invisible to end-user. Just internal mechanics. I thought about this for some more, which I explained in a followup post.

Regards, peter

Reply via email to