LEADER 03884nam 22007215 450 001 9910298963803321 005 20200703123444.0 010 $a3-319-25546-0 024 7 $a10.1007/978-3-319-25546-0 035 $a(CKB)3710000000532390 035 $a(EBL)4187992 035 $a(SSID)ssj0001597018 035 $a(PQKBManifestationID)16297906 035 $a(PQKBTitleCode)TC0001597018 035 $a(PQKBWorkID)14886256 035 $a(PQKB)11657612 035 $a(DE-He213)978-3-319-25546-0 035 $a(MiAaPQ)EBC4187992 035 $a(PPN)190882611 035 $a(EXLCZ)993710000000532390 100 $a20151207d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBuilding Secure Defenses Against Code-Reuse Attacks /$fby Lucas Davi, Ahmad-Reza Sadeghi 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (83 p.) 225 1 $aSpringerBriefs in Computer Science,$x2191-5768 300 $aDescription based upon print version of record. 311 $a3-319-25544-4 320 $aIncludes bibliographical references at the end of each chapters. 327 $aIntroduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion. 330 $aThis book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks. 410 0$aSpringerBriefs in Computer Science,$x2191-5768 606 $aComputer security 606 $aComputer programming 606 $aProgramming languages (Electronic computers) 606 $aComputers 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aProgramming Techniques$3https://scigraph.springernature.com/ontologies/product-market-codes/I14010 606 $aProgramming Languages, Compilers, Interpreters$3https://scigraph.springernature.com/ontologies/product-market-codes/I14037 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 615 0$aComputer security. 615 0$aComputer programming. 615 0$aProgramming languages (Electronic computers). 615 0$aComputers. 615 14$aSystems and Data Security. 615 24$aProgramming Techniques. 615 24$aProgramming Languages, Compilers, Interpreters. 615 24$aInformation Systems and Communication Service. 676 $a005.8 700 $aDavi$b Lucas$4aut$4http://id.loc.gov/vocabulary/relators/aut$01062951 702 $aSadeghi$b Ahmad-Reza$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910298963803321 996 $aBuilding Secure Defenses Against Code-Reuse Attacks$92529330 997 $aUNINA