Building Secure Defenses Against Code-Reuse Attacks (Record no. 54278)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03004nam a22005535i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-25546-0 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200421111208.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 151207s2015 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319255460 |
-- | 978-3-319-25546-0 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
100 1# - AUTHOR NAME | |
Author | Davi, Lucas. |
245 10 - TITLE STATEMENT | |
Title | Building Secure Defenses Against Code-Reuse Attacks |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2015. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | X, 74 p. 16 illus., 8 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | SpringerBriefs in Computer Science, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Introduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks. |
700 1# - AUTHOR 2 | |
Author 2 | Sadeghi, Ahmad-Reza. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-319-25546-0 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2015. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer programming. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Programming languages (Electronic computers). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computers. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Systems and Data Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Programming Techniques. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Programming Languages, Compilers, Interpreters. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Information Systems and Communication Service. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 2191-5768 |
912 ## - | |
-- | ZDB-2-SCS |
No items available.