Vulnerability Development mailing list archives
Re: Beating memory address randomization (secuirty) features in Unix/Linux
From: Yves Younan <yyounan () fort-knox org>
Date: Wed, 29 Mar 2006 16:03:30 +0200
There is a paper called 'On the Effectiveness of Address-Space Randomization' (http://www.stanford.edu/~blp/papers/asrandom.pdf) by Shacham et al. which was presented at CCS 2004. It shows that the randomization on 32-bit systems is not as effective as people would imagine and describes an attack on PaX's ASLR.
- YY On 25 Mar 2006, at 15:52, hd12787 () yahoo com wrote:
I've studied how to beat memory adress randomization. Does anyone know how to beat memory address randomization in Unix/Linux? Does anyone know if there are any articles related to this on the web? You can e-mail me directly instead of posting if you would like.
Attachment:
PGP.sig
Description: This is a digitally signed message part
Current thread:
- Beating memory address randomization (secuirty) features in Unix/Linux hd12787 (Mar 28)
- Re: Beating memory address randomization (secuirty) features in Unix/Linux Yves Younan (Mar 31)
- <Possible follow-ups>
- Re: Beating memory address randomization (secuirty) features in Unix/Linux xgc (Mar 31)
- Re: Beating memory address randomization (secuirty) features in Unix/Linux Don Bailey (Mar 31)
- Re: Beating memory address randomization (secuirty) features in Unix/Linux john (Mar 31)
- Re: Beating memory address randomization (secuirty) features in Unix/Linux Don Bailey (Mar 31)