Building secure defenses against code-reuse attacks / Lucas Davi, Reza Sadeghi.
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in s...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Main Authors: | , |
Format: | eBook |
Language: | English |
Published: |
Cham :
Springer,
[2015]
|
Series: | SpringerBriefs in computer science.
|
Subjects: |
MARC
LEADER | 00000cam a2200000xi 4500 | ||
---|---|---|---|
001 | b8514806 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 151209s2015 sz ob 000 0 eng d | ||
005 | 20240418151245.4 | ||
019 | |a 961621267 | ||
020 | |a 9783319255460 |q (electronic bk.) | ||
020 | |a 3319255460 |q (electronic bk.) | ||
020 | |a 3319255444 |q (print) | ||
020 | |a 9783319255446 |q (print) | ||
020 | |z 9783319255446 | ||
024 | 7 | |a 10.1007/978-3-319-25546-0 | |
035 | |a (OCoLC)spr931873581 | ||
035 | |a (OCoLC)931873581 |z (OCoLC)961621267 | ||
035 | |a (OCoLC)931873581 | ||
037 | |a spr10.1007/978-3-319-25546-0 | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d N$T |d YDXCP |d GW5XE |d IDEBK |d OCLCF |d EBLCP |d NUI |d COO |d CDX |d OCLCQ |d KSU |d IAO |d JBG |d IAS |d ICN |d IAD |d SOI |d ILO |d IDB | ||
049 | |a GWRE | ||
050 | 4 | |a QA76.9.A25 | |
100 | 1 | |a Davi, Lucas, |e author. |0 http://id.loc.gov/authorities/names/no2014007913. | |
245 | 1 | 0 | |a Building secure defenses against code-reuse attacks / |c Lucas Davi, Reza Sadeghi. |
264 | 1 | |a Cham : |b Springer, |c [2015] | |
264 | 4 | |c ©2015. | |
300 | |a 1 online resource. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
490 | 1 | |a SpringerBriefs in computer science. | |
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Introduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion. | |
520 | |a This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks. | ||
588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed December 11, 2015) | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862. | |
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524. | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484. | |
650 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935. | |
700 | 1 | |a Sadeghi, Ahmad-Reza, |e author. |0 http://id.loc.gov/authorities/names/nb2008018284 |1 http://isni.org/isni/0000000122124096. | |
776 | 0 | 8 | |i Printed edition: |z 9783319255446. |
830 | 0 | |a SpringerBriefs in computer science. |0 http://id.loc.gov/authorities/names/no2011109396. | |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-25546-0 |z Full Text (via Springer) |
907 | |a .b85148064 |b 03-19-20 |c 02-10-16 | ||
998 | |a web |b 05-01-17 |c g |d b |e - |f eng |g sz |h 0 |i 1 | ||
907 | |a .b85148064 |b 07-02-19 |c 02-10-16 | ||
944 | |a MARS - RDA ENRICHED | ||
907 | |a .b85148064 |b 07-06-17 |c 02-10-16 | ||
907 | |a .b85148064 |b 05-23-17 |c 02-10-16 | ||
915 | |a I | ||
956 | |b Springer Nature - Springer Computer Science eBooks 2015 English International | ||
956 | |a Springer e-books | ||
956 | |b Springer Nature - Springer Computer Science eBooks 2015 English International | ||
999 | f | f | |i 791bb82f-e986-5307-abe9-9befa1814411 |s bfee999d-be3d-5170-a751-c3480b4ed2c5 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e QA76.9.A25 |h Library of Congress classification |i Ebooks, Prospector |n 1 |