Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "ASLR"
From NetSec
WillieArce (Talk | contribs) m |
|||
Line 1: | Line 1: | ||
<b>A</b>ddress <b>S</b>pace <b>L</b>ayout <b>R</b>andomization | <b>A</b>ddress <b>S</b>pace <b>L</b>ayout <b>R</b>andomization | ||
− | A [[runtime security]] measure that randomizes the [[memory addresses]] that programs load data and code into. Usually implemented at the [[Operating System]] level, this will change the location of loaded code at each boot for libraries that are [[nx compliant]]. | + | A [[runtime security]] measure that randomizes the [[memory addresses]] that programs load data and code into. Usually implemented at the [[Operating System]] level, this will change the location of loaded code at each boot for libraries that are [[nx compliant]]. ASLR Bypass is typically achieved by exploiting a non [[nx compliant]] library in the context of an [[nx compliant]] operating system. |
− | [[ASLR]] is implemented in [[Linux]] Kernel 2.6*, Windows XP SP3 and more recent (Vista | + | [[ASLR]] is implemented in [[Linux]] Kernel 2.6*, Windows XP SP3 and the more recent versions (Vista, 7, and 8). |
[[Category:Countermeasures]] | [[Category:Countermeasures]] |
Revision as of 02:18, 25 April 2012
Address Space Layout Randomization
A runtime security measure that randomizes the memory addresses that programs load data and code into. Usually implemented at the Operating System level, this will change the location of loaded code at each boot for libraries that are nx compliant. ASLR Bypass is typically achieved by exploiting a non nx compliant library in the context of an nx compliant operating system.
ASLR is implemented in Linux Kernel 2.6*, Windows XP SP3 and the more recent versions (Vista, 7, and 8).