نتایج جستجو برای: aslr

تعداد نتایج: 97  

2015
Antonio Barresi Kaveh Razavi Mathias Payer Thomas R. Gross

Modern systems rely on Address-Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to protect software against memory corruption vulnerabilities. The security of ASLR depends on randomizing regions in memory which can be broken by leaking addresses. While information leaks are common for client applications, server software has been hardened to reduce such information leaks. M...

Journal: :Manual therapy 2007
Peter B O'Sullivan Darren J Beales

This study was a case series design. The objectives of the study were to investigate the ability of a motor learning intervention to change aberrant pelvic floor and diaphragm kinematics and respiratory patterns observed in subjects with sacroiliac joint pain (SIJP) during the active straight leg raise (ASLR) test. The ASLR test is a valid and reliable tool to assist in the assessment of load t...

2008
Tilo Müller

Address space layout randomization (ASLR) is a security technology to prevent exploitations of buffer overflows. But this technology is far from perfect. ”[...] its only up to the creativity of the attacker what he does. So it raises the bar for us all :) but just might make writing exploits an interesting business again.” ([Dul00] about ASLR). This paper is an introduction and a reference abou...

2016
Kun Huang Kun Luo Yili Ding Yansong Gao Minxuan Zhou

In this paper, we did a comprehensive survey on the evolution of defense in Linux softwares. Our survey mainly focused on Stack Canary, CFI and ASLR. In order to measure the coverage of Stack Canary, we collected more than 1 million package data. Besides, we also found that ASLR is an operating system behavior, and CFI was still not widely implemented in production compilers. Beyond the survey,...

Journal: :Engineering proceedings 2021

Memory management is one of the main tasks an Operating System, where data each process running in system kept. In this context, there exist several types attacks that exploit memory-related vulnerabilities, forcing Systems to feature memory protection techniques make difficult them. One these ASLR, whose function introduce randomness into virtual address space a process. The goal work was meas...

2015
John Detter Riccardo Mutschlechner

Whether or not a security feature is useful is highly dependent on how effective it is and how it affects system performance. If a security feature is effective but greatly degrades the performance of the system, then the feature is not useful. Likewise, if a security feature is very fast but is not very effective, then it is also not useful. A useful security feature needs to add a reasonable ...

2016
Angelos Oikonomopoulos Elias Athanasopoulos Herbert Bos Cristiano Giuffrida

ASLR is no longer a strong defense in itself, but it still serves as a foundation for sophisticated defenses that use randomization for pseudo-isolation. Crucially, these defenses hide sensitive information (such as shadow stacks and safe regions) at a random position in a very large address space. Previous attacks on randomization-based information hiding rely on complicated side channels and/...

2013
Jens Forster Oscar Koller Christian Oberdörfer Yannick L. Gweth Hermann Ney

Automatic sign language recognition (ASLR) is a special case of automatic speech recognition (ASR) and computer vision (CV) and is currently evolving from using artificial labgenerated data to using ’real-life’ data. Although ASLR still struggles with feature extraction, it can benefit from techniques developed for ASR. We present a large-vocabulary ASLR system that is able to recognize sentenc...

2010

Return-oriented programming (ROP), based on return-to-libc and borrowed-code-chunks techniques, is one of the buzzing advanced exploitation techniques these days to bypass NX. There are several practical works using ROP techniques for exploitations on Windows, iPhone OS to bypass DEP and code signing. On most of modern Linux distributions, ASCIIArmor address mapping (which maps libc addresses s...

2017
Jaebaek Seo Byoungyoung Lee Seong Min Kim Ming-Wei Shih Insik Shin Dongsu Han Taesoo Kim

Traditional execution environments deploy Address Space Layout Randomization (ASLR) to defend against memory corruption attacks. However, Intel Software Guard Extension (SGX), a new trusted execution environment designed to serve security-critical applications on the cloud, lacks such an effective, well-studied feature. In fact, we find that applying ASLR to SGX programs raises non-trivial issu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید