Building Secure Defenses Against Code-Reuse Attacks

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Building Secure Defenses Against Code-Reuse Attacks by Lucas Davi, Ahmad-Reza Sadeghi, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Lucas Davi, Ahmad-Reza Sadeghi ISBN: 9783319255460
Publisher: Springer International Publishing Publication: December 7, 2015
Imprint: Springer Language: English
Author: Lucas Davi, Ahmad-Reza Sadeghi
ISBN: 9783319255460
Publisher: Springer International Publishing
Publication: December 7, 2015
Imprint: Springer
Language: English

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.

Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented.

Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.

Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented.

Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.

More books from Springer International Publishing

Cover of the book Multiplicative Ideal Theory and Factorization Theory by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book A New Perspective on Nonmonotonic Logics by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Engineering Geology for Society and Territory - Volume 2 by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book The Value of Shame by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Phosphorus Chemistry I by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Immunology and Psychiatry by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Industrial Management- Control and Profit by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Surveillance, Race, Culture by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Creating Social Change Through Creativity by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Antenna Design by Simulation-Driven Optimization by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Edible Wild Plants: An alternative approach to food security by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Information Systems and Neuroscience by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Religious Indifference by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Thinking Veganism in Literature and Culture by Lucas Davi, Ahmad-Reza Sadeghi
Cover of the book Theory of Reflection by Lucas Davi, Ahmad-Reza Sadeghi
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy