The Continuing Arms Race
Code-Reuse Attacks and Defenses
As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system.The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the m…
Mehr
CHF 87.05
Preise inkl. MwSt. und Versandkosten (Portofrei ab CHF 40.00)
Versandkostenfrei
Produktdetails
Weitere Autoren: Sadeghi, Ahmad-Reza (Hrsg.)
- ISBN: 978-1-970001-82-2
- EAN: 9781970001822
- Produktnummer: 26928667
- Verlag: Association for Computing Machinery and Morgan & Claypool Publishers
- Sprache: Englisch
- Erscheinungsjahr: 2018
- Seitenangabe: 302 S.
- Plattform: EPUB
- Masse: 7'227 KB
2 weitere Werke von Per (Hrsg.) Larsen:
Bewertungen
Anmelden