語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Building Secure Defenses Against Cod...
~
Davi, Lucas.
Building Secure Defenses Against Code-Reuse Attacks
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Building Secure Defenses Against Code-Reuse Attacks/ by Lucas Davi, Ahmad-Reza Sadeghi.
作者:
Davi, Lucas.
其他作者:
Sadeghi, Ahmad-Reza.
面頁冊數:
X, 74 p. 16 illus., 8 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-319-25546-0
ISBN:
9783319255460
Building Secure Defenses Against Code-Reuse Attacks
Davi, Lucas.
Building Secure Defenses Against Code-Reuse Attacks
[electronic resource] /by Lucas Davi, Ahmad-Reza Sadeghi. - 1st ed. 2015. - X, 74 p. 16 illus., 8 illus. in color.online resource. - SpringerBriefs in Computer Science,2191-5768. - SpringerBriefs in Computer Science,.
Introduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion.
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.
ISBN: 9783319255460
Standard No.: 10.1007/978-3-319-25546-0doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Building Secure Defenses Against Code-Reuse Attacks
LDR
:02497nam a22004095i 4500
001
963269
003
DE-He213
005
20200703123444.0
007
cr nn 008mamaa
008
201211s2015 gw | s |||| 0|eng d
020
$a
9783319255460
$9
978-3-319-25546-0
024
7
$a
10.1007/978-3-319-25546-0
$2
doi
035
$a
978-3-319-25546-0
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Davi, Lucas.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1070315
245
1 0
$a
Building Secure Defenses Against Code-Reuse Attacks
$h
[electronic resource] /
$c
by Lucas Davi, Ahmad-Reza Sadeghi.
250
$a
1st ed. 2015.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2015.
300
$a
X, 74 p. 16 illus., 8 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
SpringerBriefs in Computer Science,
$x
2191-5768
505
0
$a
Introduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion.
520
$a
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.
650
0
$a
Computer security.
$3
557122
650
0
$a
Computer programming.
$3
527822
650
0
$a
Programming languages (Electronic computers).
$3
1127615
650
0
$a
Computers.
$3
565115
650
1 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Programming Techniques.
$3
669781
650
2 4
$a
Programming Languages, Compilers, Interpreters.
$3
669782
650
2 4
$a
Information Systems and Communication Service.
$3
669203
700
1
$a
Sadeghi, Ahmad-Reza.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
681980
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319255446
776
0 8
$i
Printed edition:
$z
9783319255453
830
0
$a
SpringerBriefs in Computer Science,
$x
2191-5768
$3
1255334
856
4 0
$u
https://doi.org/10.1007/978-3-319-25546-0
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入