Building Secure Defenses Against Code-Reuse Attacks
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in s...
| Published in: | Springer eBooks |
|---|---|
| Main Authors: | , |
| Corporate Author: | |
| Format: | eBook |
| Language: | English |
| Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2015.
|
| Edition: | 1st ed. 2015. |
| Series: | SpringerBriefs in Computer Science,
|
| Subjects: | |
| Online Access: | http://dx.doi.org/10.1007/978-3-319-25546-0 Перейти в каталог НБ ТГУ |
| LEADER | 03295nam a22005655i 4500 | ||
|---|---|---|---|
| 001 | vtls000560975 | ||
| 003 | RU-ToGU | ||
| 005 | 20210922090206.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 170213s2015 gw | s |||| 0|eng d | ||
| 020 | |a 9783319255460 |9 978-3-319-25546-0 | ||
| 024 | 7 | |a 10.1007/978-3-319-25546-0 |2 doi | |
| 035 | |a to000560975 | ||
| 039 | 9 | |y 201702130005 |z Александр Эльверович Гилязов | |
| 040 | |a Springer |c Springer |d RU-ToGU | ||
| 050 | 4 | |a QA76.9.A25 | |
| 072 | 7 | |a UR |2 bicssc | |
| 072 | 7 | |a UTN |2 bicssc | |
| 072 | 7 | |a COM053000 |2 bisacsh | |
| 082 | 0 | 4 | |a 005.8 |2 23 |
| 100 | 1 | |a Davi, Lucas. |e author. |9 467350 | |
| 245 | 1 | 0 | |a Building Secure Defenses Against Code-Reuse Attacks |h electronic resource |c by Lucas Davi, Ahmad-Reza Sadeghi. |
| 250 | |a 1st ed. 2015. | ||
| 260 | |a Cham : |b Springer International Publishing : |b Imprint: Springer, |c 2015. |9 742221 | ||
| 300 | |a X, 74 p. 16 illus., 8 illus. in color. |b online resource. | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 490 | 1 | |a SpringerBriefs in Computer Science, |x 2191-5768 | |
| 505 | 0 | |a Introduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion. | |
| 520 | |a This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks. | ||
| 650 | 0 | |a Computer Science. |9 155490 | |
| 650 | 0 | |a Computer programming. |9 439171 | |
| 650 | 0 | |a Programming languages (Electronic computers). |9 459680 | |
| 650 | 0 | |a Computer security. |9 348012 | |
| 650 | 0 | |a computers. |9 460101 | |
| 650 | 1 | 4 | |a Computer Science. |9 155490 |
| 650 | 2 | 4 | |a Systems and Data Security. |9 303939 |
| 650 | 2 | 4 | |a Programming Techniques. |9 566312 |
| 650 | 2 | 4 | |a Programming Languages, Compilers, Interpreters. |9 303287 |
| 650 | 2 | 4 | |a Information Systems and Communication Service. |9 304271 |
| 700 | 1 | |a Sadeghi, Ahmad-Reza. |e author. |9 329198 | |
| 710 | 2 | |a SpringerLink (Online service) |9 143950 | |
| 773 | 0 | |t Springer eBooks | |
| 830 | 0 | |a SpringerBriefs in Computer Science, |9 412137 | |
| 856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-3-319-25546-0 |
| 856 | |y Перейти в каталог НБ ТГУ |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=415092 | ||
| 912 | |a ZDB-2-SCS | ||
| 950 | |a Computer Science (Springer-11645) | ||
| 999 | |c 415092 |d 415092 | ||
