BOOK-CHAPTER

Efficient Detection of the Return-Oriented Programming Malicious Code

Pïng ChenXing XiaoHao HanBing MaoXie Li

Year: 2010 Lecture notes in computer science Pages: 140-155   Publisher: Springer Science+Business Media
Keywords:
Computer science Executable Code (set theory) False positive paradox System call Code reuse Construct (python library) Programming language Computer security Artificial intelligence Software

Metrics

22
Cited By
1.12
FWCI (Field Weighted Citation Impact)
26
Refs
0.76
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Distributed systems and fault tolerance
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

BOOK-CHAPTER

DROP: Detecting Return-Oriented Programming Malicious Code

Ping ChenHai XiaoXiaobin ShenXinchun YinBing MaoXie Li

Lecture notes in computer science Year: 2009 Pages: 163-177
BOOK-CHAPTER

ROPOB: Obfuscating Binary Code via Return Oriented Programming

Dongliang MuJia GuoWenbiao DingZhilong WangBing MaoLei Shi

Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Year: 2018 Pages: 721-737
JOURNAL ARTICLE

Return-Oriented Programming

Marco PrandiniMarco Ramilli

Journal:   IEEE Security & Privacy Year: 2012 Vol: 10 (6)Pages: 84-87
© 2026 ScienceGate Book Chapters — All rights reserved.