000 03149nam a22004935i 4500
999 _c200434284
_d52496
003 DE-He213
005 20231104114341.0
007 cr nn 008mamaa
008 151207s2015 gw | s |||| 0|eng d
020 _a9783319255460
_z978-3-319-25546-0
024 7 _a10.1007/978-3-319-25546-0
_2doi
040 _aTR-AnTOB
_beng
_cTR-AnTOB
_erda
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema005.8
_223
100 1 _aDavi, Lucas.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aBuilding Secure Defenses Against Code-Reuse Attacks /
_cby Lucas Davi, Ahmad-Reza Sadeghi.
250 _a1st ed. 2015.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 0 _aSpringerBriefs in Computer Science,
_x2191-5768
505 0 _aIntroduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion.
520 _aThis book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.
650 0 _aComputer security.
650 0 _aComputer science.
650 0 _aInformation systems.
650 1 4 _aSystems and Data Security.
_0http://scigraph.springernature.com/things/product-market-codes/I28060
650 2 4 _aProgramming Techniques.
_0http://scigraph.springernature.com/things/product-market-codes/I14010
650 2 4 _aProgramming Languages, Compilers, Interpreters.
_0http://scigraph.springernature.com/things/product-market-codes/I14037
650 2 4 _aInformation Systems and Communication Service.
_0http://scigraph.springernature.com/things/product-market-codes/I18008
700 1 _aSadeghi, Ahmad-Reza.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
856 4 0 _3Springer eBooks
_zOnline access link to the resource
_uhttps://doi.org/10.1007/978-3-319-25546-0
942 _2lcc
_cEBK
041 _aeng