The document discusses automating return oriented programming (ROP) attacks. It begins with background on ROP and related work that has limitations. The contribution is a method to automate ROP attacks on standalone binaries by analyzing the binaries to find usable gadgets despite limited registers and instructions. The conclusion reiterates the focus on standalone binaries to expand automated ROP attacks.