gptkbp:instance_of
|
gptkb:terrorist_attack
|
gptkbp:bfsLayer
|
5
|
gptkbp:bfsParent
|
gptkb:Intel_Control-flow_Enforcement_Technology
|
gptkbp:aims_to
|
execute code
|
gptkbp:bypass_ratio
|
non-executable stack
|
gptkbp:can_lead_to
|
arbitrary code execution
|
gptkbp:countermeasures
|
data execution prevention (DEP)
|
gptkbp:first_described_by
|
gptkb:2007
|
gptkbp:form
|
code reuse attack
|
https://www.w3.org/2000/01/rdf-schema#label
|
return-oriented programming (ROP) attacks
|
gptkbp:involves
|
chaining gadgets
|
gptkbp:is_often_used_in
|
advanced persistent threats (AP Ts)
|
gptkbp:is_protected_by
|
address space layout randomization (ASLR)
|
gptkbp:is_similar_to
|
jump-oriented programming (JOP)
|
gptkbp:is_vulnerable_to
|
vulnerabilities
stack-based buffer overflows
|
gptkbp:recognizes
|
control flow integrity (CFI)
|
gptkbp:related_to
|
buffer overflow attacks
|
gptkbp:requires
|
control of the call stack
|
gptkbp:targets
|
gptkb:mobile_application
|
gptkbp:technique
|
gptkb:virus
|
gptkbp:type
|
gptkb:terrorist_attack
|
gptkbp:used_in
|
computer security
|