TY - BOOK AU - Davi,Lucas AU - Sadeghi,Ahmad-Reza ED - SpringerLink (Online service) TI - Building Secure Defenses Against Code-Reuse Attacks T2 - SpringerBriefs in Computer Science, SN - 9783319255460 AV - QA76.9.A25 PY - 2015/// CY - Cham PB - Springer International Publishing, Imprint: Springer KW - Computer security KW - Computer science KW - Information systems KW - Systems and Data Security KW - Programming Techniques KW - Programming Languages, Compilers, Interpreters KW - Information Systems and Communication Service N1 - Introduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion N2 - This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks UR - https://doi.org/10.1007/978-3-319-25546-0 ER -