This paper provides a survey of methods and tools for automated code-reuse exploit generation. Such exploits use code that is already contained in vulnerable program. The approach allows one to vulnerabilities the presence operating system protection prohibits data memory execution. contains description various methods: return-to-libc attack, return-oriented programming, jump-oriented others. W...