Skip to search formSkip to main contentSkip to account menu

Return-oriented programming

Known as: Return-oriented code, KBouncer, ROP chain 
Return-oriented programming (ROP) is a computer security exploit technique that allows an attacker to execute code in the presence of security… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
This research spirited the area of central employee realms as motivation and commitment with corporate social responsibility; has… 
2015
2015
Defending against Return-Oriented Programming 
2013
2013
Code Reuse-based Attacks (popularly known as CRA) are becoming increasingly notorious because of their ability to reuse existing… 
2012
2012
In this paper, we present an approach to attack on the Xen hypervisor utilizing return-oriented programming (ROP). It modifies… 
2011
2011
Return oriented programming (ROP) has recently caught great attention of both academia and industry. It reuses existing binary… 
2010
2010
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution… 
2007
2007
A novel admission control (AC) policy is proposed for the uplink of a cellular CDMA beamforming system. An approximated power… 
1997
1997
Equilibrium configurations of rigid building blocks with multiple embedded interaction sites are investigated, as a coarse… 
1992
1992
Graph homomorphism is an edge-preserving mapping from the vertex set of a graph to the vertex set of another graph, which is the… 
1980
1980
Very recently Miyako et aJ.ll ,2l have observed nonlinear susceptiblities in some dilute magnetic alloys. They (X 2 and X4) seem…