Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,540,179 papers from all fields of science
Search
Sign In
Create Free Account
Return-oriented programming
Known as:
Return-oriented code
, KBouncer
, ROP chain
Expand
Return-oriented programming (ROP) is a computer security exploit technique that allows an attacker to execute code in the presence of security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Address space layout randomization
Blind return oriented programming
Call stack
Calling convention
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Ruthenium Hydride Catalyzed Silylvinylation of Terminal and Internal Alkynes and Synthesis of Poly(trimethylenecarbonate) and Poly(dimethylacrylamide) Block Copolymer
A. Beaton
2016
Corpus ID: 100207580
2015
2015
Return-oriented programming as an obfuscation technique
菲利普·特温
,
彼得·玛利亚·弗朗西斯科·罗姆伯茨
,
让·勒内·布兰茨
,
简·胡格布鲁格
2015
Corpus ID: 145823099
A method for obfuscating functionality of computer software is disclosed. In an embodiment, the method involves determining a…
Expand
2014
2014
PENGENDALIAN PERSEDIAAN BAHAN BAKU ROTIDI UD MINANG JAYA
Siska Tristanti Sutjiadi
2014
Corpus ID: 191528901
Persediaan memiliki peran yang penting (bahkan esensial) pada setiap organisasi. Tanpa persediaan kebanyakan kegiatan tidak…
Expand
2012
2012
Preference-Oriented Scheduling Framework and its Application to Fault-Tolerant Real-Time Systems ( Extended Version )
Yifeng Guo
,
Dakai Zhu
2012
Corpus ID: 2253672
In fault-tolerant systems, the primary and backup copies of different tasks can be scheduled together on one processor, where…
Expand
2012
2012
Return-Oriented Programming Attack on the Xen Hypervisor
Baozeng Ding
,
Y. Wu
,
Yeping He
,
Shuo Tian
,
Bei Guan
,
Guowei Wu
Seventh International Conference on Availability…
2012
Corpus ID: 18825905
In this paper, we present an approach to attack on the Xen hypervisor utilizing return-oriented programming (ROP). It modifies…
Expand
2011
2011
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming
Jun Jiang
,
Xiaoqi Jia
,
D. Feng
,
Shengzhi Zhang
,
Peng Liu
International Conference on Information…
2011
Corpus ID: 14439141
Return oriented programming (ROP) has recently caught great attention of both academia and industry. It reuses existing binary…
Expand
2010
2010
Security Mitigations for Return-Oriented Programming Attacks
Piotr Bania
arXiv.org
2010
Corpus ID: 9615967
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution…
Expand
2010
2010
RATIONING POLICY DENGAN MEMPERTIMBANGKAN LOST SALES DAN BACKORDER UNTUK SINGLE-ITEM PRODUCT DENGAN MULTI DEMAND CLASSES(STUDI KASUS: PT. SEMEN GRESIK,Tbk)
S. Evany
2010
Corpus ID: 155549509
Permasalahan yang diteliti fokus pada permasalahan yang terjadi pada manajemen inventory untuk pemenuhan order single product…
Expand
Review
1997
Review
1997
High Penetration Rates: Hazards and Well Control - A Case Study
I. Frigaard
,
N. L. Humphries
,
I. Rezmer-Cooper
,
J. James
1997
Corpus ID: 33238404
Good agreement with field data has been obtained when using a commercial kick simulator to analyse a 56 bbl gas kick taken in a…
Expand
1997
1997
Equilibrium states of rigid bodies with multiple interaction sites: Application to protein helices
B. Erman
,
I. Bahar
,
R. Jernigan
1997
Corpus ID: 15539701
Equilibrium configurations of rigid building blocks with multiple embedded interaction sites are investigated, as a coarse…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE