Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Building Secure Defenses Against Code-Reuse AttacksIntroduction

Building Secure Defenses Against Code-Reuse Attacks: Introduction [Computing platforms have become an integral part of our society over the last few decades. The landscape of computing platforms is highly diverse: starting from desktop PCs and laptops for end-users, powerful workstations used to perform highly complex calculations (e.g., weather calculations), web servers that need to simultaneously handle thousands of incoming requests, smartphones and tablets enabling on-the-road data access, up to tiny embedded devices deployed in sensors, cars, electronic passports, and medical devices.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Building Secure Defenses Against Code-Reuse AttacksIntroduction

Loading next page...
 
/lp/springer-journals/building-secure-defenses-against-code-reuse-attacks-introduction-OJaFU03cA3
Publisher
Springer International Publishing
Copyright
© The Author(s) 2015
ISBN
978-3-319-25544-6
Pages
1 –6
DOI
10.1007/978-3-319-25546-0_1
Publisher site
See Chapter on Publisher Site

Abstract

[Computing platforms have become an integral part of our society over the last few decades. The landscape of computing platforms is highly diverse: starting from desktop PCs and laptops for end-users, powerful workstations used to perform highly complex calculations (e.g., weather calculations), web servers that need to simultaneously handle thousands of incoming requests, smartphones and tablets enabling on-the-road data access, up to tiny embedded devices deployed in sensors, cars, electronic passports, and medical devices.]

Published: Dec 8, 2015

Keywords: Electronic Passports; Powerful Workstations; Code-reuse Attacks; Return-oriented Programming; Malicious Code Injection

There are no references for this article.