Table of contents
About this book
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.
Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented.
Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.
- Book Title Building Secure Defenses Against Code-Reuse Attacks
- Series Title SpringerBriefs in Computer Science
- Series Abbreviated Title SpringerBriefs Computer Sci.
- DOI https://doi.org/10.1007/978-3-319-25546-0
- Copyright Information The Author(s) 2015
- Publisher Name Springer, Cham
- eBook Packages Computer Science Computer Science (R0)
- Softcover ISBN 978-3-319-25544-6
- eBook ISBN 978-3-319-25546-0
- Series ISSN 2191-5768
- Series E-ISSN 2191-5776
- Edition Number 1
- Number of Pages X, 74
- Number of Illustrations 8 b/w illustrations, 8 illustrations in colour
Systems and Data Security
Programming Languages, Compilers, Interpreters
Information Systems and Communication Service
- Buy this book on publisher's site