Statements (15)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:code_reuse_attack_technique
|
| gptkbp:alternativeTo |
return-oriented programming
|
| gptkbp:category |
exploit technique
|
| gptkbp:enables |
arbitrary code execution
|
| gptkbp:exploits |
memory corruption vulnerabilities
|
| gptkbp:field |
computer security
|
| gptkbp:firstDescribed |
2010s
|
| gptkbp:prevention |
return instructions
|
| gptkbp:relatedTo |
return-oriented programming
|
| gptkbp:usedFor |
bypassing security defenses
|
| gptkbp:uses |
indirect jump instructions
short instruction sequences (gadgets) |
| gptkbp:bfsParent |
gptkb:Intel_Control-Flow_Enforcement_Technology
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Jump-oriented programming
|