Send or share

The Continuing Arms Race - Code-Reuse Attacks and Defenses (Hardcover)

As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system. The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs. The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.
R2,482

Pay from as little as R620.5Learn more

payflex-widget-image
Discovery Miles24820
Mobicred@R233pm x 12* Mobicred Info

Non-Returnable

Free Delivery

Free Delivery

Delivery Advice

Ships in 18 - 22 working days

Toggle WishListAdd to wish list
Review this Item

Product Description

As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system. The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs. The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Morgan & Claypool Publishers

Country of origin

United States

Series

ACM Books

Release date

February 2018

Availability

Expected to ship within 18 - 22 working days

Editors

,

Dimensions

235 x 191mm (L x W)

Format

Hardcover

Pages

302

ISBN-13

978-1-970001-83-9

Barcode

9781970001839

Categories

LSN

1-970001-83-6

Varsity Textbooks

COPYRIGHT © 2026 AFRICA ONLINE RETAIL (PTY)LTD. ALL RIGHTS RESERVED. Khutaza Park, 27 Bell Crescent, Westlake Business Park. PO Box 30836, Tokai, 7966, South Africa. info@loot.co.za

All prices displayed are subject to fluctuations and stock availability as outlined in our Terms & Conditions