Abstract
Return-oriented programming (ROP) attacks has been shown to be able to circumvent W X protection.But many Defenses against ROP attacks have been proposed. As we have seen in the recent Microsoft Bluehat Contest, This talk will present ROP techniques to Bypass such defenses. Even how a standard ROP exploit can be made alphanumeric.