Cargando…

Building Secure Defenses Against Code-Reuse Attacks

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in s...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Davi, Lucas (Autor), Sadeghi, Ahmad-Reza (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2015.
Edición:1st ed. 2015.
Colección:SpringerBriefs in Computer Science,
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-319-25546-0
003 DE-He213
005 20220114124412.0
007 cr nn 008mamaa
008 151207s2015 sz | s |||| 0|eng d
020 |a 9783319255460  |9 978-3-319-25546-0 
024 7 |a 10.1007/978-3-319-25546-0  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Davi, Lucas.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Building Secure Defenses Against Code-Reuse Attacks  |h [electronic resource] /  |c by Lucas Davi, Ahmad-Reza Sadeghi. 
250 |a 1st ed. 2015. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2015. 
300 |a X, 74 p. 16 illus., 8 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a SpringerBriefs in Computer Science,  |x 2191-5776 
505 0 |a Introduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion. 
520 |a This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks. 
650 0 |a Data protection. 
650 0 |a Computer programming. 
650 0 |a Compilers (Computer programs). 
650 0 |a Computer networks . 
650 1 4 |a Data and Information Security. 
650 2 4 |a Programming Techniques. 
650 2 4 |a Compilers and Interpreters. 
650 2 4 |a Computer Communication Networks. 
700 1 |a Sadeghi, Ahmad-Reza.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319255446 
776 0 8 |i Printed edition:  |z 9783319255453 
830 0 |a SpringerBriefs in Computer Science,  |x 2191-5776 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-319-25546-0  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)