0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Paperback, 1st ed. 2021) Loot Price: R2,927
Discovery Miles 29 270
Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Paperback, 1st ed. 2021): Yan Lin

Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Paperback, 1st ed. 2021)

Yan Lin

Series: Information Security and Cryptography

 (sign in to rate)
Loot Price R2,927 Discovery Miles 29 270 | Repayment Terms: R274 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard without the support of source code. The second component is embedding the CFI policy securely. Current CFI enforcement usually inserts checks before indirect branches to consult a read-only table which stores the valid CFG information. However, this kind of read-only table can be overwritten by some kinds of attacks (e.g., the Rowhammer attack and data-oriented programming). The third component is to efficiently enforce the CFI policy. In current approaches CFI checks are always executed whenever there is an indirect control flow transfer. Therefore, it is critical to minimize the performance impact of CFI checks. In this book, we propose novel solutions to handle these three fundamental components. To generate a precise CFI policy without the support of the source code, we systematically study two methods which recover CFI policy based on function signature matching at the binary level and propose our novel rule- and heuristic-based mechanism to more accurately recover function signature. To embed CFI policy securely, we design a novel platform which encodes the policy into the machine instructions directly without relying on consulting any read-only data structure, by making use of the idea of instruction-set randomization. Each basic block is encrypted with a key derived from the CFG. To efficiently enforce CFI policy, we make use of a mature dynamic code optimization platform called DynamoRIO to enforce the policy so that we are only required to do the CFI check when needed.

General

Imprint: Springer Nature Switzerland AG
Country of origin: Switzerland
Series: Information Security and Cryptography
Release date: May 2021
First published: 2021
Authors: Yan Lin
Dimensions: 235 x 155mm (L x W)
Format: Paperback
Pages: 95
Edition: 1st ed. 2021
ISBN-13: 978-3-03-073140-3
Categories: Books > Computing & IT > General theory of computing > Data structures
Books > Computing & IT > Computer programming > Algorithms & procedures
Books > Computing & IT > Computer communications & networking > Network security
Books > Science & Mathematics > Mathematics > Optimization > General
Books > Computing & IT > Computer programming > Programming languages > General
Promotions
LSN: 3-03-073140-5
Barcode: 9783030731403

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,704 R1,343 Discovery Miles 13 430
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,248 R1,109 Discovery Miles 11 090
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,405 Discovery Miles 24 050
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,432 R1,187 Discovery Miles 11 870
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,859 Discovery Miles 18 590
PCI Dss: A Pocket Guide
IT Governance Paperback R375 Discovery Miles 3 750
Two-Factor Authentication
Mark Stanislav Paperback R489 Discovery Miles 4 890
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R650 Discovery Miles 6 500
Computer Networking and Cybersecurity
Quinn Kiser Paperback R885 R749 Discovery Miles 7 490
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,847 Discovery Miles 68 470
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,595 Discovery Miles 85 950
Introduction to Computer Security…
Michael Goodrich, Roberto Tamassia Paperback R2,361 Discovery Miles 23 610

See more

Partners