Building secure defenses against code-reuse attacks / Lucas Davi, Reza Sadeghi.

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in s...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Main Authors: Davi, Lucas (Author), Sadeghi, Ahmad-Reza (Author)
Format: eBook
Language:English
Published: Cham : Springer, [2015]
Series:SpringerBriefs in computer science.
Subjects:

MARC

LEADER 00000cam a2200000xi 4500
001 b8514806
006 m o d
007 cr |||||||||||
008 151209s2015 sz ob 000 0 eng d
005 20240418151245.4
019 |a 961621267 
020 |a 9783319255460  |q (electronic bk.) 
020 |a 3319255460  |q (electronic bk.) 
020 |a 3319255444  |q (print) 
020 |a 9783319255446  |q (print) 
020 |z 9783319255446 
024 7 |a 10.1007/978-3-319-25546-0 
035 |a (OCoLC)spr931873581 
035 |a (OCoLC)931873581  |z (OCoLC)961621267 
035 |a (OCoLC)931873581 
037 |a spr10.1007/978-3-319-25546-0 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d YDXCP  |d GW5XE  |d IDEBK  |d OCLCF  |d EBLCP  |d NUI  |d COO  |d CDX  |d OCLCQ  |d KSU  |d IAO  |d JBG  |d IAS  |d ICN  |d IAD  |d SOI  |d ILO  |d IDB 
049 |a GWRE 
050 4 |a QA76.9.A25 
100 1 |a Davi, Lucas,  |e author.  |0 http://id.loc.gov/authorities/names/no2014007913. 
245 1 0 |a Building secure defenses against code-reuse attacks /  |c Lucas Davi, Reza Sadeghi. 
264 1 |a Cham :  |b Springer,  |c [2015] 
264 4 |c ©2015. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a SpringerBriefs in computer science. 
504 |a Includes bibliographical references. 
505 0 |a Introduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion. 
520 |a This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks. 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed December 11, 2015) 
650 0 |a Computer security.  |0 http://id.loc.gov/authorities/subjects/sh90001862. 
650 0 |a Data encryption (Computer science)  |0 http://id.loc.gov/authorities/subjects/sh94001524. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484. 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935. 
700 1 |a Sadeghi, Ahmad-Reza,  |e author.  |0 http://id.loc.gov/authorities/names/nb2008018284  |1 http://isni.org/isni/0000000122124096. 
776 0 8 |i Printed edition:  |z 9783319255446. 
830 0 |a SpringerBriefs in computer science.  |0 http://id.loc.gov/authorities/names/no2011109396. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-25546-0  |z Full Text (via Springer) 
907 |a .b85148064  |b 03-19-20  |c 02-10-16 
998 |a web  |b 05-01-17  |c g  |d b   |e -  |f eng  |g sz   |h 0  |i 1 
907 |a .b85148064  |b 07-02-19  |c 02-10-16 
944 |a MARS - RDA ENRICHED 
907 |a .b85148064  |b 07-06-17  |c 02-10-16 
907 |a .b85148064  |b 05-23-17  |c 02-10-16 
915 |a I 
956 |b Springer Nature - Springer Computer Science eBooks 2015 English International 
956 |a Springer e-books 
956 |b Springer Nature - Springer Computer Science eBooks 2015 English International 
999 f f |i 791bb82f-e986-5307-abe9-9befa1814411  |s bfee999d-be3d-5170-a751-c3480b4ed2c5 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25  |h Library of Congress classification  |i Ebooks, Prospector  |n 1