Address space layout randomization

Address space layout randomization (ASLR) is a computer security technique involved in preventing exploitation of memory corruption vulnerabilities.[1] In order to prevent an attacker from reliably redirecting code execution to, for example, a particular exploited function in memory, ASLR randomly arranges the address space positions of key data areas of a process, including the base of the executable and the positions of the stack, heap and libraries. When applied to the kernel, this technique is called kernel address space layout randomization (KASLR).[2]

  1. ^ Marco-Gisbert, Hector; Ripoll Ripoll, Ismael (2019-07-22). "Address Space Layout Randomization Next Generation". Applied Sciences. 9 (14): 2928. doi:10.3390/app9142928. hdl:10251/144813. ISSN 2076-3417.
  2. ^ Yeongjin Jang; Sangho Lee; Taesoo Kim. Breaking Kernel Address Space Layout Randomization with Intel TSX (PDF). 23rd ACM Conference on Computer and Communications Security. doi:10.1145/2976749.2978321.

© MMXXIII Rich X Search. We shall prevail. All rights reserved. Rich X Search