1 option
Building Secure Defenses Against Code-Reuse Attacks / by Lucas Davi, Ahmad-Reza Sadeghi.
- Format:
- Book
- Author/Creator:
- Davi, Lucas, author.
- Sadeghi, Ahmad-Reza, author.
- Series:
- Computer Science (Springer-11645)
- SpringerBriefs in computer science 2191-5768
- SpringerBriefs in Computer Science, 2191-5768
- Language:
- English
- Subjects (All):
- Computer security.
- Computer programming.
- Programming languages (Electronic computers).
- Computers.
- Systems and Data Security.
- Programming Techniques.
- Programming Languages, Compilers, Interpreters.
- Information Systems and Communication Service.
- Local Subjects:
- Systems and Data Security.
- Programming Techniques.
- Programming Languages, Compilers, Interpreters.
- Information Systems and Communication Service.
- Physical Description:
- 1 online resource (X, 74 pages) : 16 illustrations, 8 illustrations in color.
- Edition:
- First edition 2015.
- Contained In:
- Springer eBooks
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2015.
- System Details:
- text file PDF
- Summary:
- This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.
- Contents:
- Introduction
- Background and Evolution of Code-Reuse Attacks
- Building Control-Flow Integrity Defenses
- Building Code Randomization Defenses
- Discussion and Conclusion.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-319-25546-0
- 9783319255460
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.