© 2015

Building Secure Defenses Against Code-Reuse Attacks


Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Table of contents

  1. Front Matter
    Pages i-x
  2. Lucas Davi, Ahmad-Reza Sadeghi
    Pages 1-6
  3. Lucas Davi, Ahmad-Reza Sadeghi
    Pages 7-25
  4. Lucas Davi, Ahmad-Reza Sadeghi
    Pages 27-54
  5. Lucas Davi, Ahmad-Reza Sadeghi
    Pages 55-67
  6. Lucas Davi, Ahmad-Reza Sadeghi
    Pages 69-74

About this book


This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.

Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented.

Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.


Buffer overflow Code injection attacks Return-oriented programming Runtime attack model Runtime attacks Code randomization Control-flow integrity

Authors and affiliations

  1. 1.CASEDTechnische Universität DarmstadtDarmstadtGermany
  2. 2.CASEDTechnische Universität DarmstadtDarmstadtGermany

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment