Building Secure Defenses Against Code-Reuse Attacks Pdf This publication gives an comprehensive look in return-oriented programming strikes. It investigates several traditional return-oriented programming strikes and assesses the efficacy of protection techniques such as address space layout randomization (ASLR) as well as the control-flow constraints implemented in safety watchdogs like Microsoft EMET. Chapters also clarify the principle of control-flow ethics (CFI), emphasize the advantages of CFI and talk about its existing weaknesses. Several advanced and improved return-oriented programming assault techniques like just-in-time return-oriented programming have been introduced.
Building Secure Defenses Against Code-Reuse Attacks is an excellent reference tool for researchers, professionals and programmers working in the safety area. It supplies advanced-level pupils studying computer science using an extensive overview and clear comprehension of important runtime strikes.