Building Secure Defenses Against Code-Reuse Attacks:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
2015
|
Schriftenreihe: | SpringerBriefs in Computer Science
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FKE01 FLA01 FRO01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (X, 74 Seiten) 16 illus., 8 illus. in color |
ISBN: | 9783319255460 |
ISSN: | 2191-5768 |
DOI: | 10.1007/978-3-319-25546-0 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043309527 | ||
003 | DE-604 | ||
005 | 20160708 | ||
007 | cr|uuu---uuuuu | ||
008 | 160125s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319255460 |c Online |9 978-3-319-25546-0 | ||
024 | 7 | |a 10.1007/978-3-319-25546-0 |2 doi | |
035 | |a (OCoLC)934174685 | ||
035 | |a (DE-599)BVBBV043309527 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-634 |a DE-92 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Davi, Lucas Vincenzo |d 1984- |e Verfasser |0 (DE-588)1074776402 |4 aut | |
245 | 1 | 0 | |a Building Secure Defenses Against Code-Reuse Attacks |c by Lucas Davi, Ahmad-Reza Sadeghi |
264 | 1 | |a Cham |b Springer |c 2015 | |
300 | |a 1 Online-Ressource (X, 74 Seiten) |b 16 illus., 8 illus. in color | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in Computer Science |x 2191-5768 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer programming | |
650 | 4 | |a Programming languages (Electronic computers) | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Programming Techniques | |
650 | 4 | |a Programming Languages, Compilers, Interpreters | |
650 | 4 | |a Information Systems and Communication Service | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Sadeghi, Ahmad-Reza |e Verfasser |0 (DE-588)129275646 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-25544-6 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-25546-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730216&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730216&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028730216 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-25546-0 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25546-0 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25546-0 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25546-0 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25546-0 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25546-0 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25546-0 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25546-0 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25546-0 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25546-0 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25546-0 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25546-0 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25546-0 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25546-0 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25546-0 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175846443843584 |
---|---|
adam_text | BUILDING SECURE DEFENSES AGAINST CODE-REUSE ATTACKS
/ DAVI, LUCAS
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
BACKGROUND AND EVOLUTION OF CODE-REUSE ATTACKS
BUILDING CONTROL-FLOW INTEGRITY DEFENSES
BUILDING CODE RANDOMIZATION DEFENSES
DISCUSSION AND CONCLUSION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
BUILDING SECURE DEFENSES AGAINST CODE-REUSE ATTACKS
/ DAVI, LUCAS
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK PROVIDES AN IN-DEPTH LOOK AT RETURN-ORIENTED PROGRAMMING
ATTACKS.IT EXPLORES SEVERAL CONVENTIONAL RETURN-ORIENTED PROGRAMMING
ATTACKS AND ANALYZES THE EFFECTIVENESS OF DEFENSE TECHNIQUES INCLUDING
ADDRESS SPACE LAYOUT RANDOMIZATION (ASLR) AND THE CONTROL-FLOW
RESTRICTIONS IMPLEMENTED IN SECURITY WATCHDOGS SUCH AS MICROSOFT EMET.
CHAPTERS ALSO EXPLAIN THE PRINCIPLE OF CONTROL-FLOW INTEGRITY (CFI),
HIGHLIGHT THE BENEFITS OF CFI AND DISCUSS ITS CURRENT WEAKNESSES.
SEVERAL IMPROVED AND SOPHISTICATED RETURN-ORIENTED PROGRAMMING ATTACK
TECHNIQUES SUCH AS JUST-IN-TIME RETURN-ORIENTED PROGRAMMING ARE
PRESENTED. BUILDING SECURE DEFENSES AGAINST CODE-REUSE ATTACKS IS AN
EXCELLENT REFERENCE TOOL FOR RESEARCHERS, PROGRAMMERS AND PROFESSIONALS
WORKING IN THE SECURITY FIELD. IT PROVIDES ADVANCED-LEVEL STUDENTS
STUDYING COMPUTER SCIENCE WITH A COMPREHENSIVE OVERVIEW AND CLEAR
UNDERSTANDING OF IMPORTANT RUNTIME ATTACKS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Davi, Lucas Vincenzo 1984- Sadeghi, Ahmad-Reza |
author_GND | (DE-588)1074776402 (DE-588)129275646 |
author_facet | Davi, Lucas Vincenzo 1984- Sadeghi, Ahmad-Reza |
author_role | aut aut |
author_sort | Davi, Lucas Vincenzo 1984- |
author_variant | l v d lv lvd a r s ars |
building | Verbundindex |
bvnumber | BV043309527 |
classification_rvk | ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)934174685 (DE-599)BVBBV043309527 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-25546-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04054nmm a2200757zc 4500</leader><controlfield tag="001">BV043309527</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160708 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160125s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319255460</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-25546-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-25546-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)934174685</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043309527</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Davi, Lucas Vincenzo</subfield><subfield code="d">1984-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1074776402</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building Secure Defenses Against Code-Reuse Attacks</subfield><subfield code="c">by Lucas Davi, Ahmad-Reza Sadeghi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 74 Seiten)</subfield><subfield code="b">16 illus., 8 illus. in color</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in Computer Science</subfield><subfield code="x">2191-5768</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming languages (Electronic computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming Techniques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming Languages, Compilers, Interpreters</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems and Communication Service</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sadeghi, Ahmad-Reza</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)129275646</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-25544-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730216&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730216&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028730216</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25546-0</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043309527 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:22:46Z |
institution | BVB |
isbn | 9783319255460 |
issn | 2191-5768 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028730216 |
oclc_num | 934174685 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-634 DE-92 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-634 DE-92 DE-860 DE-861 DE-739 |
physical | 1 Online-Ressource (X, 74 Seiten) 16 illus., 8 illus. in color |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series2 | SpringerBriefs in Computer Science |
spelling | Davi, Lucas Vincenzo 1984- Verfasser (DE-588)1074776402 aut Building Secure Defenses Against Code-Reuse Attacks by Lucas Davi, Ahmad-Reza Sadeghi Cham Springer 2015 1 Online-Ressource (X, 74 Seiten) 16 illus., 8 illus. in color txt rdacontent c rdamedia cr rdacarrier SpringerBriefs in Computer Science 2191-5768 Computer science Computer programming Programming languages (Electronic computers) Computer security Computers Computer Science Systems and Data Security Programming Techniques Programming Languages, Compilers, Interpreters Information Systems and Communication Service Informatik Cyberattacke (DE-588)1075612675 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Cyberattacke (DE-588)1075612675 s DE-604 Sadeghi, Ahmad-Reza Verfasser (DE-588)129275646 aut Erscheint auch als Druckausgabe 978-3-319-25544-6 https://doi.org/10.1007/978-3-319-25546-0 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730216&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730216&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Davi, Lucas Vincenzo 1984- Sadeghi, Ahmad-Reza Building Secure Defenses Against Code-Reuse Attacks Computer science Computer programming Programming languages (Electronic computers) Computer security Computers Computer Science Systems and Data Security Programming Techniques Programming Languages, Compilers, Interpreters Information Systems and Communication Service Informatik Cyberattacke (DE-588)1075612675 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)1075612675 (DE-588)4274324-2 |
title | Building Secure Defenses Against Code-Reuse Attacks |
title_auth | Building Secure Defenses Against Code-Reuse Attacks |
title_exact_search | Building Secure Defenses Against Code-Reuse Attacks |
title_full | Building Secure Defenses Against Code-Reuse Attacks by Lucas Davi, Ahmad-Reza Sadeghi |
title_fullStr | Building Secure Defenses Against Code-Reuse Attacks by Lucas Davi, Ahmad-Reza Sadeghi |
title_full_unstemmed | Building Secure Defenses Against Code-Reuse Attacks by Lucas Davi, Ahmad-Reza Sadeghi |
title_short | Building Secure Defenses Against Code-Reuse Attacks |
title_sort | building secure defenses against code reuse attacks |
topic | Computer science Computer programming Programming languages (Electronic computers) Computer security Computers Computer Science Systems and Data Security Programming Techniques Programming Languages, Compilers, Interpreters Information Systems and Communication Service Informatik Cyberattacke (DE-588)1075612675 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer science Computer programming Programming languages (Electronic computers) Computer security Computers Computer Science Systems and Data Security Programming Techniques Programming Languages, Compilers, Interpreters Information Systems and Communication Service Informatik Cyberattacke Computersicherheit |
url | https://doi.org/10.1007/978-3-319-25546-0 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730216&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730216&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT davilucasvincenzo buildingsecuredefensesagainstcodereuseattacks AT sadeghiahmadreza buildingsecuredefensesagainstcodereuseattacks |