Computer security exploit technique that allows an attacker to execute code in the presence of security defenses such as non-executable memory and code signing.