Along with the exponential growth of API adoption comes a rise in security concerns about their implementation and inherent vulnerabilities. For those seeking comprehensive insights into building, deploying, and managing APIs as the first line of cyber defense, this book offers invaluable guidance.
Building Secure Defenses Against Code-Reuse Attacks
โ Scribed by Lucas Davi, Ahmad-Reza Sadeghi (auth.)
- Publisher
- Springer International Publishing
- Year
- 2015
- Tongue
- English
- Leaves
- 83
- Series
- SpringerBriefs in Computer Science
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.
Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented.
Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.
โฆ Table of Contents
Front Matter....Pages i-x
Introduction....Pages 1-6
Background and Evolution of Code-Reuse Attacks....Pages 7-25
Building Control-Flow Integrity Defenses....Pages 27-54
Building Code Randomization Defenses....Pages 55-67
Discussion and Conclusion....Pages 69-74
โฆ Subjects
Systems and Data Security; Programming Techniques; Programming Languages, Compilers, Interpreters; Information Systems and Communication Service
๐ SIMILAR VOLUMES
Our societies are becoming increasingly dependent on emerging technologies and connected computer systems that are increasingly trusted to store, process, and transmit sensitive data. While generally beneficial, this shift also raises many security and privacy challenges. The growing complexity and
<p><p>This first volume of a two-volume set describes general aspects, such as the historical view on the topic, the role of information distribution and preparedness of health-care systems and preparedness in emergency cases. Part two describes and discusseses in detail the pathogens and toxins tha
<p><p>This second volume of a two-volume set focuses on specific pathogens and their mechanisms of pathogenesis as well as diagnostics, therapeutics and various strategies in the event of biological attacks. This multidisciplinary book appeals to readers from various fields, including biodefense, bi