Building Secure Defenses Against Code-Reuse Attacks / by Lucas Davi, Ahmad-Reza Sadeghi.
Material type:
- text
- computer
- online resource
- 9783319255460
- QA76.9.A25
Item type | Current library | Home library | Collection | Call number | Status | Notes | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
Merkez Kütüphane | Merkez Kütüphane | E-Kitap Koleksiyonu | QA76.9.A25EBK (Browse shelf(Opens below)) | Geçerli değil-e-Kitap / Not applicable-e-Book | EBK00164 |
Introduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion.
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.
There are no comments on this title.