Building Secure Defenses Against Code Reuse Attacks


Download Building Secure Defenses Against Code Reuse Attacks PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Building Secure Defenses Against Code Reuse Attacks book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Building Secure Defenses Against Code-Reuse Attacks


Building Secure Defenses Against Code-Reuse Attacks

Author: Lucas Davi

language: en

Publisher: Springer

Release Date: 2015-12-07


DOWNLOAD





This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.

Building Secure Defenses Against Code-Reuse Attacks


Building Secure Defenses Against Code-Reuse Attacks

Author: Lucas Davi

language: en

Publisher:

Release Date: 2015


DOWNLOAD





This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.

ECCWS 2019 18th European Conference on Cyber Warfare and Security


ECCWS 2019 18th European Conference on Cyber Warfare and Security

Author: Tiago Cruz

language: en

Publisher: Academic Conferences and publishing limited

Release Date: 2019-07-04


DOWNLOAD