mailing list archives
Re: Beating memory address randomization (secuirty) features in Unix/Linux
From: Yves Younan <yyounan () fort-knox org>
Date: Wed, 29 Mar 2006 16:03:30 +0200
There is a paper called 'On the Effectiveness of Address-Space
Randomization' (http://www.stanford.edu/~blp/papers/asrandom.pdf) by
Shacham et al. which was presented at CCS 2004.
It shows that the randomization on 32-bit systems is not as effective
as people would imagine and describes an attack on PaX's ASLR.
On 25 Mar 2006, at 15:52, hd12787 () yahoo com wrote:
I've studied how to beat memory adress randomization. Does anyone
know how to beat memory address randomization in Unix/Linux? Does
anyone know if there are any articles related to this on the web?
You can e-mail me directly instead of posting if you would like.
Description: This is a digitally signed message part