Building Secure Defenses Against Code-Reuse Attacks Building Secure Defenses Against Code-Reuse Attacks
SpringerBriefs in Computer Science

Building Secure Defenses Against Code-Reuse Attacks

    • £35.99
    • £35.99

Publisher Description

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.

Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented.

Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.

GENRE
Computing & Internet
RELEASED
2015
7 December
LANGUAGE
EN
English
LENGTH
84
Pages
PUBLISHER
Springer International Publishing
SIZE
1.3
MB
Moving Target Defense Moving Target Defense
2011
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2015
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2017
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2016
Detection of Intrusions and Malware, and Vulnerability Assessment Detection of Intrusions and Malware, and Vulnerability Assessment
2009
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
2014
The Amazing Journey of Reason The Amazing Journey of Reason
2019
Agile Risk Management Agile Risk Management
2014
Introduction to Ethical Software Development Introduction to Ethical Software Development
2025
Machine Learning in Sports Machine Learning in Sports
2025
Objective Information Theory Objective Information Theory
2023
IoT Supply Chain Security Risk Analysis and Mitigation IoT Supply Chain Security Risk Analysis and Mitigation
2022