Skip to main content
USENIX
Conferences
Students
Sign in
Overview
Symposium Organizers
At a Glance
Registration Information
Registration Discounts
Venue, Hotel, and Travel
Technical Sessions
Co-Located Workshops
Accepted Posters
Activities
Birds-of-a-Feather Sessions
Work-in-Progress Reports
Sponsorship
Students and Grants
Services
Questions?
Help Promote!
Flyer PDF
For Participants
Call for Papers
Past Symposia
sponsors
Gold Sponsor
Gold Sponsor
Gold Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
twitter
Tweets by USENIXSecurity
usenix conference policies
Event Code of Conduct
Conference Network Policy
Statement on Environmental Responsibility Policy
You are here
Home
ยป
ROP: Return of the %edi
Tweet
connect with us
http://twitter.com/usenixsecurity
https://www.facebook.com/usenixassociation
http://www.linkedin.com/groups/USENIX-Association-49559/about
https://plus.google.com/108588319090208187909/posts
http://www.youtube.com/user/USENIXAssociation
ROP: Return of the %edi
Presentations:
ROP is Still Dangerous: Breaking Modern Defenses
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing
Harbor GHI
connect with us