Building Secure Defenses Against Code-Reuse Attacks

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in s...

Full description

Bibliographic Details
Published in:Springer eBooks
Main Authors: Davi, Lucas (Author), Sadeghi, Ahmad-Reza (Author)
Corporate Author: SpringerLink (Online service)
Format: eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2015.
Edition:1st ed. 2015.
Series:SpringerBriefs in Computer Science,
Subjects:
Online Access:http://dx.doi.org/10.1007/978-3-319-25546-0
Перейти в каталог НБ ТГУ
LEADER 03295nam a22005655i 4500
001 vtls000560975
003 RU-ToGU
005 20210922090206.0
007 cr nn 008mamaa
008 170213s2015 gw | s |||| 0|eng d
020 |a 9783319255460  |9 978-3-319-25546-0 
024 7 |a 10.1007/978-3-319-25546-0  |2 doi 
035 |a to000560975 
039 9 |y 201702130005  |z Александр Эльверович Гилязов 
040 |a Springer  |c Springer  |d RU-ToGU 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Davi, Lucas.  |e author.  |9 467350 
245 1 0 |a Building Secure Defenses Against Code-Reuse Attacks  |h electronic resource  |c by Lucas Davi, Ahmad-Reza Sadeghi. 
250 |a 1st ed. 2015. 
260 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2015.  |9 742221 
300 |a X, 74 p. 16 illus., 8 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a SpringerBriefs in Computer Science,  |x 2191-5768 
505 0 |a Introduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion. 
520 |a This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks. 
650 0 |a Computer Science.  |9 155490 
650 0 |a Computer programming.  |9 439171 
650 0 |a Programming languages (Electronic computers).  |9 459680 
650 0 |a Computer security.  |9 348012 
650 0 |a computers.  |9 460101 
650 1 4 |a Computer Science.  |9 155490 
650 2 4 |a Systems and Data Security.  |9 303939 
650 2 4 |a Programming Techniques.  |9 566312 
650 2 4 |a Programming Languages, Compilers, Interpreters.  |9 303287 
650 2 4 |a Information Systems and Communication Service.  |9 304271 
700 1 |a Sadeghi, Ahmad-Reza.  |e author.  |9 329198 
710 2 |a SpringerLink (Online service)  |9 143950 
773 0 |t Springer eBooks 
830 0 |a SpringerBriefs in Computer Science,  |9 412137 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-25546-0 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=415092 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645) 
999 |c 415092  |d 415092