Statements (34)
Predicate | Object |
---|---|
gptkbp:instanceOf |
computer security exploit technique
|
gptkbp:abbreviation |
gptkb:ROP
|
gptkbp:category |
cyberattack technique
code reuse attack software exploitation |
gptkbp:compatibleWith |
injecting new code
|
gptkbp:countermeasures |
stack canaries
address space layout randomization control-flow integrity non-executable stack |
gptkbp:describedBy |
Hovav Shacham's 2007 paper
|
gptkbp:enables |
privilege escalation
arbitrary code execution |
gptkbp:exploits |
existing code in memory
|
gptkbp:field |
computer security
cybersecurity |
gptkbp:firstDescribed |
2007
|
https://www.w3.org/2000/01/rdf-schema#label |
Return-oriented programming
|
gptkbp:inventedBy |
gptkb:Hovav_Shacham
|
gptkbp:opposedBy |
modern compiler mitigations
|
gptkbp:relatedTo |
stack smashing
buffer overflow code reuse attack control-flow hijacking return-to-libc attack |
gptkbp:requires |
executable code fragments (gadgets)
vulnerable program |
gptkbp:technique |
chains short instruction sequences ending in return
|
gptkbp:usedFor |
code execution
exploiting software vulnerabilities bypassing security defenses |
gptkbp:variant |
return-to-libc attack
|
gptkbp:bfsParent |
gptkb:Intel_Control-Flow_Enforcement_Technology
|
gptkbp:bfsLayer |
6
|