Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,370,917 papers from all fields of science
Search
Sign In
Create Free Account
Return-oriented programming
Known as:
Return-oriented code
, KBouncer
, ROP chain
Expand
Return-oriented programming (ROP) is a computer security exploit technique that allows an attacker to execute code in the presence of security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Address space layout randomization
Blind return oriented programming
Call stack
Calling convention
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A Source of Employee Inspiration through perceived Corporate Social Responsibility, Motivation & Commitment: Evidence from NGO Sector of Pakistan (AFAQ | Association for Academic Quality)
W. Malik
,
Q. Afzal
,
H. Mirza
2016
Corpus ID: 147360740
This research spirited the area of central employee realms as motivation and commitment with corporate social responsibility; has…
Expand
2015
2015
Defending against Return-Oriented Programming
Vasileios Pappas
2015
Corpus ID: 7774981
Defending against Return-Oriented Programming
2012
2012
Return-Oriented Programming Attack on the Xen Hypervisor
Baozeng Ding
,
Y. Wu
,
Yeping He
,
Shuo Tian
,
Bei Guan
,
Guowei Wu
Seventh International Conference on Availability…
2012
Corpus ID: 18825905
In this paper, we present an approach to attack on the Xen hypervisor utilizing return-oriented programming (ROP). It modifies…
Expand
2011
2011
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming
Jun Jiang
,
Xiaoqi Jia
,
D. Feng
,
Shengzhi Zhang
,
Peng Liu
International Conference on Information…
2011
Corpus ID: 14439141
Return oriented programming (ROP) has recently caught great attention of both academia and industry. It reuses existing binary…
Expand
2010
2010
Security Mitigations for Return-Oriented Programming Attacks
Piotr Bania
arXiv.org
2010
Corpus ID: 9615967
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution…
Expand
2007
2007
Cross-Layer Admission Control Policy for CDMA Beamforming Systems
Wei Sheng
,
S. Blostein
EURASIP Journal on Wireless Communications and…
2007
Corpus ID: 7892224
A novel admission control (AC) policy is proposed for the uplink of a cellular CDMA beamforming system. An approximated power…
Expand
1997
1997
Equilibrium states of rigid bodies with multiple interaction sites: Application to protein helices
B. Erman
,
I. Bahar
,
R. Jernigan
1997
Corpus ID: 15539701
Equilibrium configurations of rigid building blocks with multiple embedded interaction sites are investigated, as a coarse…
Expand
Review
1997
Review
1997
High Penetration Rates: Hazards and Well Control - A Case Study
I. Frigaard
,
N. L. Humphries
,
I. Rezmer-Cooper
,
J. James
1997
Corpus ID: 33238404
Good agreement with field data has been obtained when using a commercial kick simulator to analyse a 56 bbl gas kick taken in a…
Expand
1992
1992
On the Nonmultiplicativity of Oriented Cycles
H. Zhou
SIAM Journal on Discrete Mathematics
1992
Corpus ID: 31708726
Graph homomorphism is an edge-preserving mapping from the vertex set of a graph to the vertex set of another graph, which is the…
Expand
1980
1980
Phenomenological Theory of the Random Ordered Phase
Y. Ueno
,
T. Oguchi
1980
Corpus ID: 62825928
Very recently Miyako et aJ.ll ,2l have observed nonlinear susceptiblities in some dilute magnetic alloys. They (X 2 and X4) seem…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE