Building Secure Defenses Against Code-Reuse Attacks

Author:   Lucas Davi ,  Ahmad-Reza Sadeghi
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2015
ISBN:  

9783319255446


Pages:   74
Publication Date:   16 December 2015
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $129.35 Quantity:  
Add to Cart

Share |

Building Secure Defenses Against Code-Reuse Attacks


Add your own review!

Overview

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.

Full Product Details

Author:   Lucas Davi ,  Ahmad-Reza Sadeghi
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2015
Dimensions:   Width: 15.50cm , Height: 0.50cm , Length: 23.50cm
Weight:   1.416kg
ISBN:  

9783319255446


ISBN 10:   3319255444
Pages:   74
Publication Date:   16 December 2015
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Introduction.- Background and Evolution of Code-Reuse Attacks.- Building Control-Flow Integrity Defenses.- Building Code Randomization Defenses.- Discussion and Conclusion.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List