ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Evaluation of the Executional Power in Windows using Return Oriented Programming
2021 IEEE Security and Privacy Workshops (SPW)
◽
10.1109/spw53761.2021.00056
◽
2021
◽
Author(s):
Daniel Uroz
◽
Ricardo J. Rodriguez
Keyword(s):
Return Oriented Programming
Download Full-text
Related Documents
Cited By
References
Zero-Sum Defender: Fast and Space-Efficient Defense against Return-Oriented Programming Attacks
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
◽
10.1587/transfun.e97.a.303
◽
2014
◽
Vol E97.A
(1)
◽
pp. 303-305
◽
Cited By ~ 3
Author(s):
Jeehong KIM
◽
Inhyeok KIM
◽
Changwoo MIN
◽
Young Ik EOM
Keyword(s):
Return Oriented Programming
◽
Zero Sum
Download Full-text
Improvement and Weakness of Zero-Sum Defender against Return-Oriented Programming Attacks
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
◽
10.1587/transfun.e99.a.2585
◽
2016
◽
Vol E99.A
(12)
◽
pp. 2585-2590
Author(s):
Donghoon LEE
◽
Jaewook JUNG
◽
Younsung CHOI
◽
Dongho WON
Keyword(s):
Return Oriented Programming
◽
Zero Sum
Download Full-text
Learning How to Prevent Return-Oriented Programming Efficiently
Lecture Notes in Computer Science - Engineering Secure Software and Systems
◽
10.1007/978-3-319-15618-7_6
◽
2015
◽
pp. 68-85
◽
Cited By ~ 4
Author(s):
David Pfaff
◽
Sebastian Hack
◽
Christian Hammer
Keyword(s):
Return Oriented Programming
Download Full-text
Return-Oriented Programming on a Cortex-M Processor
2017 IEEE Trustcom/BigDataSE/ICESS
◽
10.1109/trustcom/bigdatase/icess.2017.318
◽
2017
◽
Cited By ~ 4
Author(s):
Nathanael R. Weidler
◽
Dane Brown
◽
Samuel A. Mitchel
◽
Joel Anderson
◽
Jonathan R. Williams
◽
...
Keyword(s):
Return Oriented Programming
Download Full-text
Design and Implementation of Efficient Mitigation against Return-oriented Programming
Journal of KIISE
◽
10.5626/jok.2014.41.12.1018
◽
2014
◽
Vol 41
(12)
◽
pp. 1018-1025
Author(s):
Jeehong Kim
◽
Inhyeok Kim
◽
Changwoo Min
◽
Young Ik Eom
Keyword(s):
Design And Implementation
◽
Return Oriented Programming
Download Full-text
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming
Proceedings 2015 Network and Distributed System Security Symposium
◽
10.14722/ndss.2015.23262
◽
2015
◽
Cited By ~ 71
Author(s):
Lucas Davi
◽
Christopher Liebchen
◽
Ahmad-Reza Sadeghi
◽
Kevin Z. Snow
◽
Fabian Monrose
Keyword(s):
Just In Time
◽
Return Oriented Programming
Download Full-text
Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture
2020 23rd Euromicro Conference on Digital System Design (DSD)
◽
10.1109/dsd51259.2020.00034
◽
2020
◽
Author(s):
Kai Lehniger
◽
Marcin J. Aftowicz
◽
Peter Langendorfer
◽
Zoya Dyka
Keyword(s):
Hardware Architecture
◽
Return Oriented Programming
Download Full-text
Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices
10.1109/csnet52717.2021.9614275
◽
2021
◽
Author(s):
AbdElaziz Saad AbdElaziz AbdElaal
◽
Kai Lehniger
◽
Peter Langendorfer
Keyword(s):
Resource Constrained
◽
Return Oriented Programming
◽
Resource Constrained Devices
◽
Constrained Devices
Download Full-text
Return-Oriented Programming Attack on the Xen Hypervisor
2012 Seventh International Conference on Availability, Reliability and Security
◽
10.1109/ares.2012.16
◽
2012
◽
Cited By ~ 9
Author(s):
Baozeng Ding
◽
Yanjun Wu
◽
Yeping He
◽
Shuo Tian
◽
Bei Guan
◽
...
Keyword(s):
Return Oriented Programming
Download Full-text
DROP: Detecting Return-Oriented Programming Malicious Code
Information Systems Security - Lecture Notes in Computer Science
◽
10.1007/978-3-642-10772-6_13
◽
2009
◽
pp. 163-177
◽
Cited By ~ 67
Author(s):
Ping Chen
◽
Hai Xiao
◽
Xiaobin Shen
◽
Xinchun Yin
◽
Bing Mao
◽
...
Keyword(s):
Malicious Code
◽
Return Oriented Programming
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close