I am trying to get more information about binary executable randomization
that is used for increasing uncertainty for attacker toward software vulnerability. I've been searching on Google but still couldn't find a clear explanation. Can someone provide an explanation of a link that can help me understand this?
Asked
Active
Viewed 246 times
0
-
1what resources did you use? – Limit Dec 18 '16 at 01:22
-
Did you by any chance read this paper: http://bitblaze.cs.berkeley.edu/papers/CCFIR-oakland-CR.pdf ? It seems to have the same title as your question – Limit Dec 18 '16 at 01:24
-
You might want to look at this thread http://security.stackexchange.com/questions/18556/how-do-aslr-and-dep-work. – Sunil Agrawal Jan 17 '17 at 05:38
1 Answers
1
My guess is you're looking for the term ASLR. The techniques mentioned in the comments are for completely preventing things like ROP gadgets. ASLR will jumble the layout of the program in memory, so an attacker cant easily say "the return address i need to overwrite to redirect the control flow of the program is at offset X past the buffer i overflowed"
-
I had the same idea but when I searched the term that @Alli mentioned, I realised that there were papers so I add then – Limit Dec 18 '16 at 04:18
-
1Yeah me too. But i checked his other questions and he asked the difference between a vpn and ipsec. – J.A.K. Dec 19 '16 at 06:38