Automated Software Diversity

Automated Software Diversity

Automated Software Diversity

Lucas Davi / Per Larsen / Stefan Brunthaler

47,21 €
IVA incluido
Consulta disponibilidad
Editorial:
Morgan and Claypool Publishers
Año de edición:
2015
ISBN:
9781627057349
47,21 €
IVA incluido
Consulta disponibilidad

Selecciona una librería:

  • Librería 7artes
  • Donde los libros
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the worst case, give adversaries unfettered access to the compromised host system.This book provides an introduction to and overview of automatic software diversity techniques that, in one way or another, use randomization to greatly increase the difficulty of exploiting the vast amounts of low-level code in existence. Diversity-based defenses are motivated by the observation that a single attack will fail against multiple targets with unique attack surfaces. We introduce the many, often complementary, ways that one can diversify attack surfaces and provide an accessible guide to more than two decades worth of research on the topic. We also discuss techniques used in conjunction with diversity to prevent accidental disclosure of randomized program aspects and present an in-depth case study of one of our own diversification solutions. 3

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
    Disponible

    255,72 €

  • Foundations of Cryptography
    Goldreich Oded / Oded Goldreich
    ...
    Disponible

    87,03 €

  • Quantum Information Theory
    Mark M. Wilde / Mark MWilde
    ...
    Disponible

    105,66 €

  • Privacy Risk Analysis
    Daniel Le Métayer / Sourya Joyee De
    Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis.The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal dat...
    Consulta disponibilidad

    67,66 €

  • CEH Certified Ethical Hacker Certification The Ultimate Study Guide to Practice Questions and Master the Exam
    Jake T Mills
    Are you preparing to become a Certified Ethical Hacker (CEH)? This comprehensive guide is designed to assist you in mastering the concepts, techniques, and skills necessary to ace the CEH certification exam. Inside this book, you’ll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensu...
    Disponible

    35,69 €

  • Mobile Platform Security
    Alexandra Dmitrienko / Lucas Davi / N. Asokan
    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application exec...
    Consulta disponibilidad

    50,46 €