313 kr
Beställningsvara. Skickas inom 10-15 vardagar. Fri frakt över 249 kr.
Beskrivning
Produktinformation
- Utgivningsdatum:2015-12-23
- Mått:191 x 235 x 6 mm
- Vikt:190 g
- Format:Häftad
- Språk:Engelska
- Serie:Synthesis Lectures on Information Security, Privacy, and Trust
- Antal sidor:76
- Förlag:Springer International Publishing AG
- ISBN:9783031012181
- Originaltitel:Automated Software Diversity
Utforska kategorier
Mer om författaren
Per Larsen recently decided to try his luck as an entrepreneur and currently leads an information security startup: Immunant, Inc. Previously, he worked four years as a postdoctoral scholar at the University of California, Irvine. He graduated with a Ph.D. from the Technical University of Denmark in 2011. He enjoys caffeinated beverages and staying up very late.Stefan Brunthaler received a Dr.techn. with distinction from TU Vienna in 2011 and spent the next four years as postdoctoral scholar at the University of California, Irvine. Currently, he is a key researcher at SBA Research in Vienna, Austria, working on various topics in language-based security.Lucas Davi is a researcher at the Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at Technische Universitat Darmstadt, Germany. He received his Ph.D. from Technische Universitat Darmstadt, Germany, in computer science, focusing on code-reuse attacks and defenses. His research focuses on exploits suchas return-oriented programming (ROP) for diverse processor architectures. He is working on new attack methods and countermeasures against exploits such as control-flow integrity and software diversity.Ahmad-Reza Sadeghi is a full professor of Computer Science at Technische Universitat Darmstadt, Germany. He is the head of the System Security Lab at the Center for Advanced Security Research Darmstadt (CASED) and the Director of the Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU Darmstadt. He holds a Ph.D. in Computer Science from the University of Saarland in Saarbrucken, Germany. Prior to academia, he worked in Research and Development of Telecommunications enterprises, amongst others Ericsson Telecommunications.Michael Franz is the director of the Secure Systems and Software Laboratory at the University of California, Irvine (UCI). He is a Full Professor of Computer Science in UCI's Donald Bren School of Information and Computer Sciences and a Full Professor of Electrical Engineering and Computer Science (by courtesy) in UCI's Henry Samueli School of Engineering. Prof. Franz was an early pioneer in the areas of mobile code and dynamic compilation. He created an early just-in-time compilation system, contributed to the theory and practice of continuous compilation and optimization, and co-invented the trace compilation technology that eventually became the JavaScript engine in Mozilla's Firefox browser. Franz received a Dr. sc. techn. degree in Computer Science and a Dipl. Informatik-Ing. ETH degree, both from the Swiss Federal Institute of Technology, ETH Zurich.
Innehållsförteckning
- Preface.- Acknowledgments.- Introduction.- Attacking and Defending.- What to Diversify.- When to Diversify.- Case Study: Compile-time Diversification.- Information Leakage Resilience.- Advanced Topics.- Bibliography.- Authors' Biographies.
Betyg & recensioner
0/5
Betyg & recensioner
Mer från samma serie
Analysis Techniques for Information Security
Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps
368 kr
Enhancing Information Security and Privacy by Combining Biometrics with Cryptography
Sanjay Kanade, Dijana Petrovska-Delacretaz, Bernadette Dorizzi
368 kr
Hardware Malware
Edgar Weippl, Christian Krieg, Adrian Dabrowski, Katharina Krombholz, Heidelinde Hobel
368 kr
Security and Trust in Online Social Networks
Barbara Carminati, Elena Ferrari, Marco Viviani
368 kr
Mobile Platform Security
N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi
368 kr
Du kanske också är intresserad av
Anomaly Detection as a Service
Danfeng (Daphne) Yao, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo
608 kr
Analysis Techniques for Information Security
Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps
368 kr
Security and Trust in Online Social Networks
Barbara Carminati, Elena Ferrari, Marco Viviani
368 kr
Journey into Security Certification
Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Nabil El Ioini
313 kr
Machine Learning Techniques for Cybersecurity
Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub
445 kr