03884nam 22007215 450 991029896380332120200703123444.03-319-25546-010.1007/978-3-319-25546-0(CKB)3710000000532390(EBL)4187992(SSID)ssj0001597018(PQKBManifestationID)16297906(PQKBTitleCode)TC0001597018(PQKBWorkID)14886256(PQKB)11657612(DE-He213)978-3-319-25546-0(MiAaPQ)EBC4187992(PPN)190882611(EXLCZ)99371000000053239020151207d2015 u| 0engur|n|---|||||txtccrBuilding Secure Defenses Against Code-Reuse Attacks /by Lucas Davi, Ahmad-Reza Sadeghi1st ed. 2015.Cham :Springer International Publishing :Imprint: Springer,2015.1 online resource (83 p.)SpringerBriefs in Computer Science,2191-5768Description based upon print version of record.3-319-25544-4 Includes bibliographical references at the end of each chapters.Introduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion.This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.SpringerBriefs in Computer Science,2191-5768Computer securityComputer programmingProgramming languages (Electronic computers)ComputersSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Programming Techniqueshttps://scigraph.springernature.com/ontologies/product-market-codes/I14010Programming Languages, Compilers, Interpretershttps://scigraph.springernature.com/ontologies/product-market-codes/I14037Information Systems and Communication Servicehttps://scigraph.springernature.com/ontologies/product-market-codes/I18008Computer security.Computer programming.Programming languages (Electronic computers).Computers.Systems and Data Security.Programming Techniques.Programming Languages, Compilers, Interpreters.Information Systems and Communication Service.005.8Davi Lucasauthttp://id.loc.gov/vocabulary/relators/aut1062951Sadeghi Ahmad-Rezaauthttp://id.loc.gov/vocabulary/relators/autMiAaPQMiAaPQMiAaPQBOOK9910298963803321Building Secure Defenses Against Code-Reuse Attacks2529330UNINA