BOOK-CHAPTER

ROPOB: Obfuscating Binary Code via Return Oriented Programming

Dongliang MuJia GuoWenbiao DingZhilong WangBing MaoLei Shi

Year: 2018 Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Pages: 721-737
Keywords:
Obfuscation Reverse engineering Computer science Control flow Overhead (engineering) Software Reuse Malware Code (set theory) Embedded system Computer security Engineering Operating system Programming language

Metrics

12
Cited By
2.32
FWCI (Field Weighted Citation Impact)
29
Refs
0.90
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Adversarial Robustness in Machine Learning
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

BOOK-CHAPTER

DROP: Detecting Return-Oriented Programming Malicious Code

Ping ChenHai XiaoXiaobin ShenXinchun YinBing MaoXie Li

Lecture notes in computer science Year: 2009 Pages: 163-177
BOOK-CHAPTER

Efficient Detection of the Return-Oriented Programming Malicious Code

Pïng ChenXing XiaoHao HanBing MaoXie Li

Lecture notes in computer science Year: 2010 Pages: 140-155
JOURNAL ARTICLE

Return-Oriented Programming

Marco PrandiniMarco Ramilli

Journal:   IEEE Security & Privacy Year: 2012 Vol: 10 (6)Pages: 84-87
JOURNAL ARTICLE

Return-Oriented Programming

Ryan RoemerErik BuchananHovav ShachamStefan Savage

Journal:   ACM Transactions on Information and System Security Year: 2012 Vol: 15 (1)Pages: 1-34
© 2026 ScienceGate Book Chapters — All rights reserved.