The Community for Technology Leaders
Green Image
Issue No. 06 - Nov.-Dec. (2012 vol. 10)
ISSN: 1540-7993
pp: 84-87
Marco Ramilli , University of Bologna, Italy
Marco Prandini , University of Bologna, Italy
Attackers able to compromise the memory of a target machine can change its behavior and usually gain complete control over it. Despite the ingenious prevention and protection mechanisms that have been implemented in modern operating systems, memory corruption attacks still account for a big share of the security breaches afflicting software systems. This article describes a growing attack trend that uses return-oriented programming (ROP) techniques to bypass the most common memory protection systems.
Operating systems, Programming, Computer crime, Computer security, Buffer overflows, operating systems, buffer overflows, attack, ROP, return-oriented programming
Marco Ramilli, Marco Prandini, "Return-Oriented Programming", IEEE Security & Privacy, vol. 10, no. , pp. 84-87, Nov.-Dec. 2012, doi:10.1109/MSP.2012.152
100 ms
(Ver 3.1 (10032016))