Télécharger le livre :  Building Secure Defenses Against Code-Reuse Attacks
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow...

Editeur : Springer
Parution : 2015-12-07
PDF, ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Towards Hardware-Intrinsic Security
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required...

Editeur : Springer
Parution : 2010-11-03
Collection : Information Security and Cryptography ePub

147,69

Téléchargement immédiat
Dès validation de votre commande