This HTML5 document contains 79 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n8http://0x36.blogspot.it/2014/06/
yago-reshttp://yago-knowledge.org/resource/
n9https://labs.portcullis.co.uk/blog/ohm-2013-review-of-returning-signals-for-fun-and-profit/
dbohttp://dbpedia.org/ontology/
n21http://dbpedia.org/resource/File:
foafhttp://xmlns.com/foaf/0.1/
n20http://v0ids3curity.blogspot.it/2015/06/
n19https://global.dbpedia.org/id/
n7http://docs.binjit.su/rop/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
n23http://x86overflow.blogspot.it/2014/04/
n14http://zer0day.tistory.com/
dbpedia-fahttp://fa.dbpedia.org/resource/
n22http://commons.wikimedia.org/wiki/Special:FilePath/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
wikipedia-enhttp://en.wikipedia.org/wiki/
dbphttp://dbpedia.org/property/
dbchttp://dbpedia.org/resource/Category:
provhttp://www.w3.org/ns/prov#
xsdhhttp://www.w3.org/2001/XMLSchema#
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Return-oriented_programming
dbo:wikiPageWikiLink
dbr:Sigreturn-oriented_programming
Subject Item
dbr:Signal_cookie
dbo:wikiPageWikiLink
dbr:Sigreturn-oriented_programming
dbo:wikiPageRedirects
dbr:Sigreturn-oriented_programming
Subject Item
dbr:Central_processing_unit
dbo:wikiPageWikiLink
dbr:Sigreturn-oriented_programming
Subject Item
dbr:Sigreturn-oriented_programming
rdfs:label
Sigreturn-oriented programming
rdfs:comment
Sigreturn-oriented programming (SROP) is a computer security exploit technique that allows an attacker to execute code in presence of security measures such as non-executable memory and code signing. It was presented for the first time at the 35th IEEE Symposium on Security and Privacy in 2014 where it won the best student paper award. This technique employs the same basic assumptions behind the return-oriented programming (ROP) technique: an attacker controlling the call stack, for example through a stack buffer overflow, is able to influence the control flow of the program through simple instruction sequences called gadgets. The attack works by pushing a forged sigcontext structure on the call stack, overwriting the original return address with the location of a gadget that allows the at
foaf:depiction
n22:Sigret_stackframe.svg
dcterms:subject
dbc:Computer_security_exploits
dbo:wikiPageID
50825018
dbo:wikiPageRevisionID
1115666265
dbo:wikiPageWikiLink
dbr:Control-flow_Enforcement_Technology dbr:Data_execution_prevention dbr:System_call dbr:Brainfuck_programming_language dbr:Control_flow dbr:NX_bit dbr:Context_switch dbr:Linux dbr:Code_reuse dbr:Intel dbr:Linux_kernel dbr:Virtual_machine dbr:Linux_kernel_interfaces dbr:Exclusive_or dbr:Call_stack dbr:POSIX dbr:Binaries dbr:Executable_space_protection dbr:Stack_(abstract_data_type) dbr:Weird_machine dbr:Computer_security_exploit dbr:Turing-complete dbr:Vulnerability_(computing) dbr:Exploit_(computer_security) dbr:Shadow_stack dbr:Stack_buffer_overflow dbr:Shellcode dbr:VDSO dbr:Gadget_(machine_instruction_sequence) dbr:Buffer_overflow dbc:Computer_security_exploits dbr:Return-oriented_programming dbr:Shell_(computing) dbr:Information_leakage dbr:Canary_value dbr:Address_space_layout_randomization dbr:Backdoor_(computing) dbr:Magic_cookie dbr:Unix_signal n21:Sigret_stackframe.svg dbr:Self-modifying_program dbr:Memory_management_unit dbr:Stack_smashing
dbo:wikiPageExternalLink
n7:srop.html n8:sigreturn-rop-exploitation-technique.html n9: n14:275 n20:fun-with-srop-exploitation.html n23:playing-around-with-srop.html
owl:sameAs
yago-res:Sigreturn-oriented_programming wikidata:Q24894771 dbpedia-fa:حمله‌های_مبتنی_بر_سواستفاده_از_تابع_بازگشت_از_سیگنال n19:2M2cA
dbp:wikiPageUsesTemplate
dbt:Ya dbt:Short_description dbt:Reflist dbt:Na dbt:Mono dbt:Anchor
dbo:thumbnail
n22:Sigret_stackframe.svg?width=300
dbo:abstract
Sigreturn-oriented programming (SROP) is a computer security exploit technique that allows an attacker to execute code in presence of security measures such as non-executable memory and code signing. It was presented for the first time at the 35th IEEE Symposium on Security and Privacy in 2014 where it won the best student paper award. This technique employs the same basic assumptions behind the return-oriented programming (ROP) technique: an attacker controlling the call stack, for example through a stack buffer overflow, is able to influence the control flow of the program through simple instruction sequences called gadgets. The attack works by pushing a forged sigcontext structure on the call stack, overwriting the original return address with the location of a gadget that allows the attacker to call the sigreturn system call. Often just a single gadget is needed to successfully put this attack into effect. This gadget may reside at a fixed location, making this attack simple and effective, with a setup generally simpler and more portable than the one needed by the plain return-oriented programming technique. Sigreturn-oriented programming can be considered a weird machine since it allows code execution outside the original specification of the program.
prov:wasDerivedFrom
wikipedia-en:Sigreturn-oriented_programming?oldid=1115666265&ns=0
dbo:wikiPageLength
13379
foaf:isPrimaryTopicOf
wikipedia-en:Sigreturn-oriented_programming
Subject Item
dbr:SROP
dbo:wikiPageWikiLink
dbr:Sigreturn-oriented_programming
Subject Item
dbr:SROP_(computer_security)
dbo:wikiPageWikiLink
dbr:Sigreturn-oriented_programming
dbo:wikiPageRedirects
dbr:Sigreturn-oriented_programming
Subject Item
dbr:VDSO
dbo:wikiPageWikiLink
dbr:Sigreturn-oriented_programming
Subject Item
wikipedia-en:Sigreturn-oriented_programming
foaf:primaryTopic
dbr:Sigreturn-oriented_programming