000 | 03621nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-031-02346-0 | ||
003 | DE-He213 | ||
005 | 20240730165030.0 | ||
007 | cr nn 008mamaa | ||
008 | 220601s2016 sz | s |||| 0|eng d | ||
020 |
_a9783031023460 _9978-3-031-02346-0 |
||
024 | 7 |
_a10.1007/978-3-031-02346-0 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aLarsen, Per. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _987174 |
|
245 | 1 | 0 |
_aAutomated Software Diversity _h[electronic resource] / _cby Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXI, 76 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 |
|
505 | 0 | _aPreface -- Acknowledgments -- Introduction -- Attacking and Defending -- What to Diversify -- When to Diversify -- Case Study: Compile-time Diversification -- Information Leakage Resilience -- Advanced Topics -- Bibliography -- Authors' Biographies. | |
520 | _aWhereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the worst case, give adversaries unfettered access to the compromised host system. This book provides an introduction to and overview of automatic software diversity techniques that, in one way or another, use randomization to greatly increase the difficulty of exploiting the vast amounts of low-level code in existence. Diversity-based defenses are motivated by the observation that a single attack will fail against multiple targets with unique attack surfaces. We introduce the many, often complementary, ways that one can diversify attack surfaces and provide an accessible guide to more than two decades worth of research on the topic. We also discuss techniques used in conjunction with diversity to prevent accidental disclosure of randomized program aspects and present an in-depth case study of one of our own diversification solutions. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aBrunthaler, Stefan. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _987176 |
|
700 | 1 |
_aDavi, Lucas. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _987177 |
|
700 | 1 |
_aSadeghi, Ahmad-Reza. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _987179 |
|
700 | 1 |
_aFranz, Michael. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _987181 |
|
710 | 2 |
_aSpringerLink (Online service) _987182 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031012181 |
776 | 0 | 8 |
_iPrinted edition: _z9783031034749 |
830 | 0 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 _987183 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-02346-0 |
912 | _aZDB-2-SXSC | ||
942 | _cEBK | ||
999 |
_c86061 _d86061 |