Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (5 chapters)
Keywords
About this book
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.
Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented.
Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.
Authors and Affiliations
Bibliographic Information
Book Title: Building Secure Defenses Against Code-Reuse Attacks
Authors: Lucas Davi, Ahmad-Reza Sadeghi
Series Title: SpringerBriefs in Computer Science
DOI: https://doi.org/10.1007/978-3-319-25546-0
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Author(s) 2015
Softcover ISBN: 978-3-319-25544-6Published: 16 December 2015
eBook ISBN: 978-3-319-25546-0Published: 07 December 2015
Series ISSN: 2191-5768
Series E-ISSN: 2191-5776
Edition Number: 1
Number of Pages: X, 74
Number of Illustrations: 8 b/w illustrations, 8 illustrations in colour
Topics: Systems and Data Security, Programming Techniques, Programming Languages, Compilers, Interpreters, Information Systems and Communication Service