Building Secure Defenses Against Code-Reuse Attacks Building Secure Defenses Against Code-Reuse Attacks
SpringerBriefs in Computer Science

Building Secure Defenses Against Code-Reuse Attacks

    • $39.99
    • $39.99

Publisher Description

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.

Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented.

Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.

GENRE
Computers & Internet
RELEASED
2015
December 7
LANGUAGE
EN
English
LENGTH
84
Pages
PUBLISHER
Springer International Publishing
SELLER
Springer Nature B.V.
SIZE
1.3
MB
Moving Target Defense Moving Target Defense
2011
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2015
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2017
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2016
Detection of Intrusions and Malware, and Vulnerability Assessment Detection of Intrusions and Malware, and Vulnerability Assessment
2009
DYNAMICALLY ENABLED CYBER DEFENSE DYNAMICALLY ENABLED CYBER DEFENSE
2021
The Amazing Journey of Reason The Amazing Journey of Reason
2019
Neuro Symbolic Reasoning and Learning Neuro Symbolic Reasoning and Learning
2023
Objective Information Theory Objective Information Theory
2023
Developing Sustainable and Energy-Efficient Software Systems Developing Sustainable and Energy-Efficient Software Systems
2023
Deep Neural Networks in a Mathematical Framework Deep Neural Networks in a Mathematical Framework
2018
Big Data Big Data
2014