return-oriented programming (ROP) attacks

GPTKB entity

Statements (23)
Predicate Object
gptkbp:instance_of gptkb:terrorist_attack
gptkbp:bfsLayer 5
gptkbp:bfsParent gptkb:Intel_Control-flow_Enforcement_Technology
gptkbp:aims_to execute code
gptkbp:bypass_ratio non-executable stack
gptkbp:can_lead_to arbitrary code execution
gptkbp:countermeasures data execution prevention (DEP)
gptkbp:first_described_by gptkb:2007
gptkbp:form code reuse attack
https://www.w3.org/2000/01/rdf-schema#label return-oriented programming (ROP) attacks
gptkbp:involves chaining gadgets
gptkbp:is_often_used_in advanced persistent threats (AP Ts)
gptkbp:is_protected_by address space layout randomization (ASLR)
gptkbp:is_similar_to jump-oriented programming (JOP)
gptkbp:is_vulnerable_to vulnerabilities
stack-based buffer overflows
gptkbp:recognizes control flow integrity (CFI)
gptkbp:related_to buffer overflow attacks
gptkbp:requires control of the call stack
gptkbp:targets gptkb:mobile_application
gptkbp:technique gptkb:virus
gptkbp:type gptkb:terrorist_attack
gptkbp:used_in computer security