My Account Log in

1 option

Building Secure Defenses Against Code-Reuse Attacks / by Lucas Davi, Ahmad-Reza Sadeghi.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Author/Creator:
Davi, Lucas, author.
Sadeghi, Ahmad-Reza, author.
Contributor:
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
SpringerBriefs in computer science 2191-5768
SpringerBriefs in Computer Science, 2191-5768
Language:
English
Subjects (All):
Computer security.
Computer programming.
Programming languages (Electronic computers).
Computers.
Systems and Data Security.
Programming Techniques.
Programming Languages, Compilers, Interpreters.
Information Systems and Communication Service.
Local Subjects:
Systems and Data Security.
Programming Techniques.
Programming Languages, Compilers, Interpreters.
Information Systems and Communication Service.
Physical Description:
1 online resource (X, 74 pages) : 16 illustrations, 8 illustrations in color.
Edition:
First edition 2015.
Contained In:
Springer eBooks
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2015.
System Details:
text file PDF
Summary:
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.
Contents:
Introduction
Background and Evolution of Code-Reuse Attacks
Building Control-Flow Integrity Defenses
Building Code Randomization Defenses
Discussion and Conclusion.
Other Format:
Printed edition:
ISBN:
978-3-319-25546-0
9783319255460
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account