Building Secure Defenses Against Code-Reuse Attacks

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Building Secure Defenses Against Code-Reuse Attacks by Lucas Davi, Ahmad-Reza Sadeghi, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Lucas Davi, Ahmad-Reza Sadeghi ISBN: 9783319255460
Publisher: Springer International Publishing Publication: December 7, 2015
Imprint: Springer Language: English
Author: Lucas Davi, Ahmad-Reza Sadeghi
ISBN: 9783319255460
Publisher: Springer International Publishing
Publication: December 7, 2015
Imprint: Springer
Language: English

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.

Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented.

Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.

Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented.

Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.

More books from Springer International Publishing

Cover of the book Saramago’s Philosophical Heritage by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Numerical and Evolutionary Optimization – NEO 2017 by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Animals, Race, and Multiculturalism by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Protein Targeting Compounds by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Human Missions to Mars by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Combinatorial Optimization and Applications by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Smart Multimedia by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Biorefineries by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Legal Principles for Combatting Cyberlaundering by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book ICT Diffusion in Developing Countries by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Economics for Sustainable Prosperity by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book The Chemistry of Benzotriazole Derivatives by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Philosophy of Technology after the Empirical Turn by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Towards a Compact Thin-Disk-Based Femtosecond XUV Source by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book On the Move to Meaningful Internet Systems: OTM 2016 Workshops by Lucas Davi, Ahmad-Reza Sadeghi
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy