wyszukanych pozycji: 3
Building Secure Defenses Against Code-Reuse Attacks
ISBN: 9783319255446 / Angielski / Miękka / 2015 / 74 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time... This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks an... |
|
cena:
192,74 zł |
Automated Software Diversity
ISBN: 9783031012181 / Angielski / Miękka / 2015 / 92 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the worst case, give adversaries unfettered access to the compromised host system. This book provides an introduction to and overview of automatic software diversity techniques that, in one way or another, use randomization...
Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that u...
|
|
cena:
107,92 zł |
Mobile Platform Security
ISBN: 9783031012136 / Angielski / Miękka / 2014 / 112 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model...
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The cur...
|
|
cena:
127,20 zł |