Return-oriented programming

Known as: Return-oriented code, KBouncer, ROP chain 
Return-oriented programming (ROP) is a computer security exploit technique that allows an attacker to execute code in the presence of security… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1980-2018
010203019802018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Until recently, it was widely believed that code randomization (such as fine-grained ASLR) can effectively mitigate code reuse… (More)
  • figure 6
  • figure 7
  • table III
  • table II
  • figure 8
Is this relevant?
Highly Cited
2012
Highly Cited
2012
We introduce return-oriented programming, a technique by which an attacker can induce arbitrary behavior in a program whose… (More)
  • figure 1
  • figure 4
  • figure 6
  • figure 8
  • figure 10
Is this relevant?
2012
2012
Attackers able to compromise the memory of a target machine can change its behavior and usually gain complete control over it… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2012
Highly Cited
2012
The wide adoption of non-executable page protections in recent versions of popular operating systems has given rise to attacks… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Modern runtime attacks increasingly make use of the powerful return-oriented programming (ROP) attack techniques and principles… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We show that on both the x86 and ARM architectures it is possible to mount return-oriented programming attacks without using… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2010
2010
In this paper we present a novel and general memory-related attack method on ARM-based computing platforms. Our attack deploys… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Despite the many efforts made in recent years to mitigate runtime attacks such as stack and heap based buffer overflows, these… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This paper reconsiders the threat posed by Shacham's "return-oriented programming" -- a technique by which W-xor-X-style hardware… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 8
Is this relevant?