Building Secure Defenses Against Code-Reuse Attacks Building Secure Defenses Against Code-Reuse Attacks
SpringerBriefs in Computer Science

Building Secure Defenses Against Code-Reuse Attacks

    • 42,99 €
    • 42,99 €

Beschreibung des Verlags

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.

Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented.

Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.

GENRE
Computer und Internet
ERSCHIENEN
2015
7. Dezember
SPRACHE
EN
Englisch
UMFANG
84
Seiten
VERLAG
Springer International Publishing
ANBIETERINFO
Springer Science & Business Media LLC
GRÖSSE
1,3
 MB
Moving Target Defense Moving Target Defense
2011
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2015
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2017
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2016
Detection of Intrusions and Malware, and Vulnerability Assessment Detection of Intrusions and Malware, and Vulnerability Assessment
2009
DYNAMICALLY ENABLED CYBER DEFENSE DYNAMICALLY ENABLED CYBER DEFENSE
2021
The Amazing Journey of Reason The Amazing Journey of Reason
2019
Manifold Learning Manifold Learning
2024
The Mathematical Theory of Semantic Communication The Mathematical Theory of Semantic Communication
2025
Developing Sustainable and Energy-Efficient Software Systems Developing Sustainable and Energy-Efficient Software Systems
2023
Objective Information Theory Objective Information Theory
2023
Distributed Hash Table Distributed Hash Table
2013