Process Injection Using Return-Oriented Programming
Return-oriented programming (ROP) is a code-reuse attack that uses borrowed chunks of executable code for arbitrary computation. On Windows, ROP is often used solely to bypass Data Execution Prevention, rather than realizing its full potential; indeed, the bulk of advanced, malicious functionality i...
Saved in:
| Main Authors: | Bramwell Brizendine, Shiva Shashank Kusuma, Bhaskar P. Rimal |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/11095694/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Predictable Paths: Novel ASLR Bypass Methods and Mitigations
by: Bramwell Brizendine, et al.
Published: (2025-01-01) -
Research progress in code reuse attacking and defending
by: Xiangdong QIAO, et al.
Published: (2018-03-01) -
Association of various postnatal risk factors with progression of retinopathy of prematurity (ROP) in preterm neonates: A case-control study
by: Alisha Gaba, et al.
Published: (2025-04-01) -
Comment on ‘‘RIO: Return Instruction Obfuscation for Bare-Metal IoT Devices’’
by: Kai Lehniger, et al.
Published: (2025-01-01) -
Oculodigital phenomenon leading to advanced keratoconus in Retinopathy of Prematurity – A case report
by: Devesh Kumawat, et al.
Published: (2019-07-01)