DocumentCode :
1628906
Title :
Measuring ASLR implementations on modern operating systems
Author :
Herrera Aristizabal, David ; Mora Rodriguez, David ; Yepes Guevara, Ricardo
Author_Institution :
Univ. de Antioquia, Medellin, Colombia
fYear :
2013
Firstpage :
1
Lastpage :
6
Abstract :
Address Space Layout Randomization (ASLR) is a security technique that uses randomness to conceal regions of virtual memory address space of processes, to increase the effort required to develop reliable exploits. It was introduced in the first decade of the third millennium as a mechanism to stop a dangerous attack vector, known as memory corruption. This paper presents a methodology used to evaluate the effectiveness of this technique, as well as the results of the evaluation of two commonly used operating systems: Microsoft´s Windows 7 and Canonical´s Ubuntu Linux 10.10, both in the 32-bits and 64-bits versions.
Keywords :
operating systems (computers); security of data; ASLR implementation; Canonical Ubuntu Linux 10.10; Microsoft Windows 7; address space layout randomization; memory corruption; operating systems; security technique; virtual memory address space; Entropy; Kernel; Libraries; Linux; NIST; Security; ASLR; Linux protections; Memory corruption; Windows protections;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology (ICCST), 2013 47th International Carnahan Conference on
Conference_Location :
Medellin
Type :
conf
DOI :
10.1109/CCST.2013.6922073
Filename :
6922073
Link To Document :
بازگشت