000 03621nam a22005295i 4500
001 978-3-031-02346-0
003 DE-He213
005 20240730165030.0
007 cr nn 008mamaa
008 220601s2016 sz | s |||| 0|eng d
020 _a9783031023460
_9978-3-031-02346-0
024 7 _a10.1007/978-3-031-02346-0
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aLarsen, Per.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_987174
245 1 0 _aAutomated Software Diversity
_h[electronic resource] /
_cby Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz.
250 _a1st ed. 2016.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aXI, 76 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSynthesis Lectures on Information Security, Privacy, and Trust,
_x1945-9750
505 0 _aPreface -- Acknowledgments -- Introduction -- Attacking and Defending -- What to Diversify -- When to Diversify -- Case Study: Compile-time Diversification -- Information Leakage Resilience -- Advanced Topics -- Bibliography -- Authors' Biographies.
520 _aWhereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the worst case, give adversaries unfettered access to the compromised host system. This book provides an introduction to and overview of automatic software diversity techniques that, in one way or another, use randomization to greatly increase the difficulty of exploiting the vast amounts of low-level code in existence. Diversity-based defenses are motivated by the observation that a single attack will fail against multiple targets with unique attack surfaces. We introduce the many, often complementary, ways that one can diversify attack surfaces and provide an accessible guide to more than two decades worth of research on the topic. We also discuss techniques used in conjunction with diversity to prevent accidental disclosure of randomized program aspects and present an in-depth case study of one of our own diversification solutions.
650 0 _aData protection.
_97245
650 1 4 _aData and Information Security.
_931990
700 1 _aBrunthaler, Stefan.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_987176
700 1 _aDavi, Lucas.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_987177
700 1 _aSadeghi, Ahmad-Reza.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_987179
700 1 _aFranz, Michael.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_987181
710 2 _aSpringerLink (Online service)
_987182
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031012181
776 0 8 _iPrinted edition:
_z9783031034749
830 0 _aSynthesis Lectures on Information Security, Privacy, and Trust,
_x1945-9750
_987183
856 4 0 _uhttps://doi.org/10.1007/978-3-031-02346-0
912 _aZDB-2-SXSC
942 _cEBK
999 _c86061
_d86061