Statements (15)
Predicate | Object |
---|---|
gptkbp:instanceOf |
code reuse attack technique
|
gptkbp:alternativeTo |
return-oriented programming
|
gptkbp:category |
exploit technique
|
gptkbp:enables |
arbitrary code execution
|
gptkbp:exploits |
memory corruption vulnerabilities
|
gptkbp:field |
computer security
|
gptkbp:firstDescribed |
2010s
|
https://www.w3.org/2000/01/rdf-schema#label |
Jump-oriented programming
|
gptkbp:prevention |
return instructions
|
gptkbp:relatedTo |
return-oriented programming
|
gptkbp:usedFor |
bypassing security defenses
|
gptkbp:uses |
indirect jump instructions
short instruction sequences (gadgets) |
gptkbp:bfsParent |
gptkb:Intel_Control-Flow_Enforcement_Technology
|
gptkbp:bfsLayer |
6
|