Building Secure Defenses Against Code-Reuse Attacks

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in s...

Full description

Bibliographic Details
Main Authors: Davi, Lucas, Sadeghi, Ahmad-Reza (Author)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2015, 2015
Edition:1st ed. 2015
Series:SpringerBriefs in Computer Science
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02344nmm a2200349 u 4500
001 EB001087482
003 EBX01000000000000000846846
005 00000000000000.0
007 cr|||||||||||||||||||||
008 160104 ||| eng
020 |a 9783319255460 
100 1 |a Davi, Lucas 
245 0 0 |a Building Secure Defenses Against Code-Reuse Attacks  |h Elektronische Ressource  |c by Lucas Davi, Ahmad-Reza Sadeghi 
250 |a 1st ed. 2015 
260 |a Cham  |b Springer International Publishing  |c 2015, 2015 
300 |a X, 74 p. 16 illus., 8 illus. in color  |b online resource 
505 0 |a Introduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion 
653 |a Computer security 
653 |a Information Systems and Communication Service 
653 |a Computer programming 
653 |a Programming Languages, Compilers, Interpreters 
653 |a Programming languages (Electronic computers) 
653 |a Programming Techniques 
653 |a Computers 
653 |a Systems and Data Security 
700 1 |a Sadeghi, Ahmad-Reza  |e [author] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a SpringerBriefs in Computer Science 
856 4 0 |u https://doi.org/10.1007/978-3-319-25546-0?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks