Building Secure Defenses Against Code-Reuse Attacks Building Secure Defenses Against Code-Reuse Attacks
SpringerBriefs in Computer Science

Building Secure Defenses Against Code-Reuse Attacks

    • €42.99
    • €42.99

Publisher Description

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.

Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented.

Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.

GENRE
Computing & Internet
RELEASED
2015
7 December
LANGUAGE
EN
English
LENGTH
84
Pages
PUBLISHER
Springer International Publishing
PROVIDER INFO
Springer Science & Business Media LLC
SIZE
1.3
MB
Moving Target Defense Moving Target Defense
2011
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2015
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2017
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2016
Detection of Intrusions and Malware, and Vulnerability Assessment Detection of Intrusions and Malware, and Vulnerability Assessment
2009
DYNAMICALLY ENABLED CYBER DEFENSE DYNAMICALLY ENABLED CYBER DEFENSE
2021
The Amazing Journey of Reason The Amazing Journey of Reason
2019
Agile Risk Management Agile Risk Management
2014
Multilingual Text Recognition Multilingual Text Recognition
2026
Knowledge Distillation in Computer Vision Knowledge Distillation in Computer Vision
2026
Mobile Data Services Mobile Data Services
2026
Computational Infodemiology Computational Infodemiology
2026