Contest seeks defenses designed to make software better withstand ROP attacks. Ironically, the popularity of ROP grew because of its ability to bypass another security mitigation known as data ...