Buch, Englisch, 74 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1416 g
Buch, Englisch, 74 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1416 g
Reihe: SpringerBriefs in Computer Science
ISBN: 978-3-319-25544-6
Verlag: Springer International Publishing
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.
Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented.
Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Introduction.- Background and Evolution of Code-Reuse Attacks.- Building Control-Flow Integrity Defenses.- Building Code Randomization Defenses.- Discussion and Conclusion.