Building Secure Defenses Against Code-Reuse Attacks
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in s...
| Published in: | Springer eBooks |
|---|---|
| Main Authors: | , |
| Corporate Author: | |
| Format: | eBook |
| Language: | English |
| Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2015.
|
| Edition: | 1st ed. 2015. |
| Series: | SpringerBriefs in Computer Science,
|
| Subjects: | |
| Online Access: | http://dx.doi.org/10.1007/978-3-319-25546-0 Перейти в каталог НБ ТГУ |
| Summary: | This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks. |
|---|---|
| Physical Description: | X, 74 p. 16 illus., 8 illus. in color. online resource. |
| ISBN: | 9783319255460 |
| ISSN: | 2191-5768 |
