TY - BOOK ID - 14225173 TI - Building Secure Defenses Against Code-Reuse Attacks AU - Davi, Lucas. AU - Sadeghi, Ahmad-Reza. PY - 2015 SN - 3319255444 3319255460 PB - Cham : Springer International Publishing : Imprint: Springer, DB - UniCat KW - Computer Science KW - Engineering & Applied Sciences KW - Computer security. KW - Data encryption (Computer science) KW - Data encoding (Computer science) KW - Encryption of data (Computer science) KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Security of computer systems KW - Security measures KW - Protection of computer systems KW - Protection KW - Computer science. KW - Computer programming. KW - Programming languages (Electronic computers). KW - Computers. KW - Computer Science. KW - Systems and Data Security. KW - Programming Techniques. KW - Programming Languages, Compilers, Interpreters. KW - Information Systems and Communication Service. KW - Data protection KW - Security systems KW - Hacking KW - Automatic computers KW - Automatic data processors KW - Computer hardware KW - Computing machines (Computers) KW - Electronic brains KW - Electronic calculating-machines KW - Electronic computers KW - Hardware, Computer KW - Cybernetics KW - Machine theory KW - Calculators KW - Cyberspace KW - Computer languages KW - Computer program languages KW - Computer programming languages KW - Machine language KW - Electronic data processing KW - Languages, Artificial KW - Electronic computer programming KW - Programming (Electronic computers) KW - Coding theory KW - Informatics KW - Science KW - Programming KW - Computer security KW - Cryptography KW - Information systems. UR - https://www.unicat.be/uniCat?func=search&query=sysid:14225173 AB - This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks. ER -