Beschreibung:
As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system.
Table of Contents: Preface / 1. How Memory Safety Violations Enable Exploitation of Programs / 2. Protecting Dynamic Code / 3. Diversity and Information Leaks / 4. Code-Pointer Integrity / 5. Evaluating Control-Flow Restricting Defenses / 6. Attacking Dynamic Code / 7. Hardware Control Flow Integrity / 8. Multi-Variant Execution Environments / References / Contributor Biographies