๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Building Secure Defenses Against Code-Reuse Attacks

โœ Scribed by Lucas Davi, Ahmad-Reza Sadeghi (auth.)


Publisher
Springer International Publishing
Year
2015
Tongue
English
Leaves
83
Series
SpringerBriefs in Computer Science
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.

Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented.

Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.

โœฆ Table of Contents


Front Matter....Pages i-x
Introduction....Pages 1-6
Background and Evolution of Code-Reuse Attacks....Pages 7-25
Building Control-Flow Integrity Defenses....Pages 27-54
Building Code Randomization Defenses....Pages 55-67
Discussion and Conclusion....Pages 69-74

โœฆ Subjects


Systems and Data Security; Programming Techniques; Programming Languages, Compilers, Interpreters; Information Systems and Communication Service


๐Ÿ“œ SIMILAR VOLUMES


Defending APIs against Cyber Attack: Lea
โœ Colin Domoney ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Packt Publishing Ltd. ๐ŸŒ English

Along with the exponential growth of API adoption comes a rise in security concerns about their implementation and inherent vulnerabilities. For those seeking comprehensive insights into building, deploying, and managing APIs as the first line of cyber defense, this book offers invaluable guidance.

The Continuing Arms Race: Code-Reuse Att
โœ Per Larsen & Ahmad-Reza Sadeghi ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Association for Computing Machinery and Morgan & C ๐ŸŒ English

Our societies are becoming increasingly dependent on emerging technologies and connected computer systems that are increasingly trusted to store, process, and transmit sensitive data. While generally beneficial, this shift also raises many security and privacy challenges. The growing complexity and

Defense Against Biological Attacks: Volu
โœ Sunit K. Singh, Jens H. Kuhn ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p><p>This first volume of a two-volume set describes general aspects, such as the historical view on the topic, the role of information distribution and preparedness of health-care systems and preparedness in emergency cases. Part two describes and discusseses in detail the pathogens and toxins tha

Defense Against Biological Attacks: Volu
โœ Sunit K. Singh, Jens H. Kuhn ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p><p>This second volume of a two-volume set focuses on specific pathogens and their mechanisms of pathogenesis as well as diagnostics, therapeutics and various strategies in the event of biological attacks. This multidisciplinary book appeals to readers from various fields, including biodefense, bi