0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Paperback, 1st ed. 2021) Loot Price: R2,873
Discovery Miles 28 730
Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Paperback, 1st ed. 2021): Yan Lin

Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Paperback, 1st ed. 2021)

Yan Lin

Series: Information Security and Cryptography

 (sign in to rate)
Loot Price R2,873 Discovery Miles 28 730 | Repayment Terms: R269 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard without the support of source code. The second component is embedding the CFI policy securely. Current CFI enforcement usually inserts checks before indirect branches to consult a read-only table which stores the valid CFG information. However, this kind of read-only table can be overwritten by some kinds of attacks (e.g., the Rowhammer attack and data-oriented programming). The third component is to efficiently enforce the CFI policy. In current approaches CFI checks are always executed whenever there is an indirect control flow transfer. Therefore, it is critical to minimize the performance impact of CFI checks. In this book, we propose novel solutions to handle these three fundamental components. To generate a precise CFI policy without the support of the source code, we systematically study two methods which recover CFI policy based on function signature matching at the binary level and propose our novel rule- and heuristic-based mechanism to more accurately recover function signature. To embed CFI policy securely, we design a novel platform which encodes the policy into the machine instructions directly without relying on consulting any read-only data structure, by making use of the idea of instruction-set randomization. Each basic block is encrypted with a key derived from the CFG. To efficiently enforce CFI policy, we make use of a mature dynamic code optimization platform called DynamoRIO to enforce the policy so that we are only required to do the CFI check when needed.

General

Imprint: Springer Nature Switzerland AG
Country of origin: Switzerland
Series: Information Security and Cryptography
Release date: May 2021
First published: 2021
Authors: Yan Lin
Dimensions: 235 x 155mm (L x W)
Format: Paperback
Pages: 95
Edition: 1st ed. 2021
ISBN-13: 978-3-03-073140-3
Categories: Books > Computing & IT > General theory of computing > Data structures
Books > Computing & IT > Computer programming > Algorithms & procedures
Books > Computing & IT > Computer communications & networking > Network security
Books > Science & Mathematics > Mathematics > Optimization > General
Books > Computing & IT > Computer programming > Programming languages > General
Promotions
LSN: 3-03-073140-5
Barcode: 9783030731403

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,420 R1,242 Discovery Miles 12 420
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,916 Discovery Miles 19 160
PCI Dss: A Pocket Guide
IT Governance Paperback R417 Discovery Miles 4 170
Two-Factor Authentication
Mark Stanislav Paperback R534 Discovery Miles 5 340
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R683 Discovery Miles 6 830
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,724 Discovery Miles 67 240
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,077 Discovery Miles 10 770
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,432 Discovery Miles 64 320
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,410 Discovery Miles 84 100

See more

Partners