Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity

Author:   Yan Lin
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2021
ISBN:  

9783030731403


Pages:   95
Publication Date:   01 May 2021
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $290.37 Quantity:  
Add to Cart

Share |

Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity


Add your own review!

Overview

Full Product Details

Author:   Yan Lin
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2021
Weight:   0.454kg
ISBN:  

9783030731403


ISBN 10:   3030731405
Pages:   95
Publication Date:   01 May 2021
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

{draft, needs completion} 1       Introduction 1.1   Overview of Control-Flow Integrity 1.2    Practicality of Recovering Fine-grained CFI Policies 1.3   Control-Flow Carrying Code 1.4   Control-Flow Integrity Enforcement Based on Dynamic Code Optimization 2        Literature Review 2.1   Control-Flow Hijacking 2.2   Deployed Defenses 2.3   Control-Flow Integrity 3        When Function Signature Recovery Meets Compiler Optimization 3.1   Introduction 3.2   Background and Unified Notation 3.3   Eight Ways in Which Compiler Optimization Impacts Function Signature Recovery 3.4   Evaluation 3.5   Revised Policy 3.6   Evaluation on revised policy 3.7   Summary 4        Control-Flow Carrying Code 4.1   Introduction 4.2   Overview of C^3 4.3   Detailed Designed of C^3 4.4   Implementation 4.5   Evaluation 4.6   Discussion 4.7   Summary 5     Control-Flow Integrity Enforcement with Dynamic Code Optimization 5.1   Introduction 5.2   Design, Implementation, and Security Comparison 5.3   Detailed Performance Profiling 5.4   Security Evaluation 5.5   Summary 6        Conclusion Bibliography

Reviews

Author Information

Yan Lin is at the School of Computing and Information Systems, Singapore Management University. Her extensive studies have focused on the area of cybersecurity, and her current researches focus on software security and system security. 

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List