What is the purpose of Return Oriented Programming (ROP) and what security mitigation does it bypass?

Cybersecurity Fundamentals Hard

Cybersecurity Fundamentals — Hard

What is the purpose of Return Oriented Programming (ROP) and what security mitigation does it bypass?

Key points

  • ROP involves chaining small code snippets together
  • It uses existing code snippets (gadgets) to perform operations
  • ROP bypasses non-executable memory protections like DEP/NX
  • The technique does not involve injecting new code

Ready to go further?

Related questions