Home page logo

Vulnerability Development mailing list archives

Re: Beating memory address randomization (secuirty) features in Unix/Linux
From: Yves Younan <yyounan () fort-knox org>
Date: Wed, 29 Mar 2006 16:03:30 +0200

There is a paper called 'On the Effectiveness of Address-Space Randomization' (http://www.stanford.edu/~blp/papers/asrandom.pdf) by Shacham et al. which was presented at CCS 2004. It shows that the randomization on 32-bit systems is not as effective as people would imagine and describes an attack on PaX's ASLR.

- YY

On 25 Mar 2006, at 15:52, hd12787 () yahoo com wrote:

I've studied how to beat memory adress randomization. Does anyone know how to beat memory address randomization in Unix/Linux? Does anyone know if there are any articles related to this on the web? You can e-mail me directly instead of posting if you would like.

Attachment: PGP.sig
Description: This is a digitally signed message part

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]