Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,494,432 papers from all fields of science
Search
Sign In
Create Free Account
Return-oriented programming
Known as:
Return-oriented code
, KBouncer
, ROP chain
Expand
Return-oriented programming (ROP) is a computer security exploit technique that allows an attacker to execute code in the presence of security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Address space layout randomization
Blind return oriented programming
Call stack
Calling convention
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A Source of Employee Inspiration through perceived Corporate Social Responsibility, Motivation & Commitment: Evidence from NGO Sector of Pakistan (AFAQ | Association for Academic Quality)
W. Malik
,
Q. Afzal
,
H. Mirza
2016
Corpus ID: 147360740
This research spirited the area of central employee realms as motivation and commitment with corporate social responsibility; has…
Expand
2015
2015
Defending against Return-Oriented Programming
Vasileios Pappas
2015
Corpus ID: 7774981
Defending against Return-Oriented Programming
2013
2013
JOP-alarm: Detecting jump-oriented programming-based anomalies in applications
Fan Yao
,
Jie Chen
,
Guru Venkataramani
ICCD
2013
Corpus ID: 17834530
Code Reuse-based Attacks (popularly known as CRA) are becoming increasingly notorious because of their ability to reuse existing…
Expand
2012
2012
Return-Oriented Programming Attack on the Xen Hypervisor
Baozeng Ding
,
Y. Wu
,
Yeping He
,
Shuo Tian
,
Bei Guan
,
Guowei Wu
Seventh International Conference on Availability…
2012
Corpus ID: 18825905
In this paper, we present an approach to attack on the Xen hypervisor utilizing return-oriented programming (ROP). It modifies…
Expand
2011
2011
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming
Jun Jiang
,
Xiaoqi Jia
,
D. Feng
,
Shengzhi Zhang
,
Peng Liu
International Conference on Information…
2011
Corpus ID: 14439141
Return oriented programming (ROP) has recently caught great attention of both academia and industry. It reuses existing binary…
Expand
2010
2010
Security Mitigations for Return-Oriented Programming Attacks
Piotr Bania
arXiv.org
2010
Corpus ID: 9615967
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution…
Expand
2007
2007
Cross-Layer Admission Control Policy for CDMA Beamforming Systems
Wei Sheng
,
S. Blostein
EURASIP Journal on Wireless Communications and…
2007
Corpus ID: 7892224
A novel admission control (AC) policy is proposed for the uplink of a cellular CDMA beamforming system. An approximated power…
Expand
1997
1997
Equilibrium states of rigid bodies with multiple interaction sites: Application to protein helices
B. Erman
,
I. Bahar
,
R. Jernigan
1997
Corpus ID: 15539701
Equilibrium configurations of rigid building blocks with multiple embedded interaction sites are investigated, as a coarse…
Expand
1992
1992
On the Nonmultiplicativity of Oriented Cycles
H. Zhou
SIAM Journal on Discrete Mathematics
1992
Corpus ID: 31708726
Graph homomorphism is an edge-preserving mapping from the vertex set of a graph to the vertex set of another graph, which is the…
Expand
1980
1980
Phenomenological Theory of the Random Ordered Phase
Y. Ueno
,
T. Oguchi
1980
Corpus ID: 62825928
Very recently Miyako et aJ.ll ,2l have observed nonlinear susceptiblities in some dilute magnetic alloys. They (X 2 and X4) seem…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required