Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity: Information Security and Cryptography
Autor Yan Linen Limba Engleză Paperback – mai 2021
Din seria Information Security and Cryptography
- 20% Preț: 352.02 lei
- 20% Preț: 770.30 lei
- 20% Preț: 303.85 lei
- 20% Preț: 1452.94 lei
- 20% Preț: 988.47 lei
- 20% Preț: 327.10 lei
- 20% Preț: 453.21 lei
- 20% Preț: 607.34 lei
- 20% Preț: 331.40 lei
- 20% Preț: 406.32 lei
- 20% Preț: 346.56 lei
- 18% Preț: 950.52 lei
- 24% Preț: 795.26 lei
- 20% Preț: 595.07 lei
- 20% Preț: 487.73 lei
- Preț: 450.28 lei
- 20% Preț: 877.77 lei
- 20% Preț: 332.39 lei
- 20% Preț: 418.59 lei
- 20% Preț: 649.28 lei
- 20% Preț: 552.72 lei
- 20% Preț: 577.40 lei
- 20% Preț: 653.38 lei
- 20% Preț: 670.25 lei
- 20% Preț: 334.53 lei
- 20% Preț: 414.72 lei
- 20% Preț: 640.69 lei
Preț: 636.41 lei
Preț vechi: 795.50 lei
-20% Nou
121.81€ • 126.69$ • 102.08£
Carte tipărită la comandă
Livrare economică 13-27 martie
Specificații
ISBN-10: 3030731405
Ilustrații: XIII, 95 p. 23 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.17 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seria Information Security and Cryptography
Locul publicării:Cham, Switzerland
Cuprins
1 Introduction
1.1 Overview of Control-Flow Integrity
1.2 Practicality of Recovering Fine-grained CFI Policies1.3 Control-Flow Carrying Code
1.4 Control-Flow Integrity Enforcement Based on Dynamic Code Optimization
2 Literature Review
2.1 Control-Flow Hijacking
2.2 Deployed Defenses
2.3 Control-Flow Integrity
3 When Function Signature Recovery Meets Compiler Optimization
3.1 Introduction
3.2 Background and Unified Notation
3.3 Eight Ways in Which Compiler Optimization Impacts Function Signature Recovery
3.4 Evaluation
3.5 Revised Policy
3.6 Evaluation on revised policy
3.7 Summary
4 Control-Flow Carrying Code
4.1 Introduction
4.2 Overview of C^3
4.3 Detailed Designed of C^3
4.4 Implementation
4.5 Evaluation
4.6 Discussion
4.7 Summary
5 Control-Flow Integrity Enforcement with Dynamic Code Optimization
5.1 Introduction
5.2 Design, Implementation, and Security Comparison
5.3 Detailed Performance Profiling
5.4 Security Evaluation
5.5 Summary
6 Conclusion
Bibliography
Notă biografică
Textul de pe ultima copertă
- Provides deep understanding of Control-Flow Integrity
- Offers new insights on the relationship between function signature and compiler optimization
- Demonstrates how CFI can be more efficient than Data Execution Prevention