Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Benign Use of ROP

biblio

Visible to the public A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use

Submitted by grigby1 on Mon, 11/04/2019 - 12:34pm
  • ROP Defense
  • programming
  • pubcrawl
  • Randomization
  • Registers
  • resilience
  • return-oriented programming
  • return-oriented programming attack
  • rop attacks
  • OS
  • Scalability
  • security mechanisms
  • security of data
  • Software
  • software watermarking
  • Steganography
  • Watermarking
  • defense mechanisms
  • Compositionality
  • Resiliency
  • Benign Use of ROP
  • code integrity verification
  • code reuse attack
  • composability
  • computer security
  • Control Flow Integrity
  • Information Reuse and Security
  • extended ROP attack
  • frequency control
  • Human behavior
  • Human Factors
  • Layout
  • operating system
  • operating systems (computers)

Terms of Use  |  ©2023. CPS-VO