Hidden Bibliographic Details
Other authors / contributors: | Sadeghi, Ahmad-Reza, author.
|
ISBN: | 9783319255460 3319255460 3319255444 9783319255446 9783319255446
|
Digital file characteristics: | text file PDF
|
Notes: | Includes bibliographical references. Online resource; title from PDF title page (EBSCO, viewed December 11, 2015).
|
Summary: | This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.
|
Other form: | Printed edition: 9783319255446
|
Standard no.: | 10.1007/978-3-319-25546-0
|