Learn More
Despite numerous attempts to mitigate code-reuse attacks , Return-Oriented Programming (ROP) is still at the core of exploiting memory corruption vulnerabili-ties. Most notably, in JIT-ROP, an attacker dynamically searches for suitable gadgets in executable code pages, even if they have been randomized. JIT-ROP seemingly requires that (i) code is readable(More)
  • 1