2018
DOI: 10.1134/s0361768818050080
|View full text |Cite
|
Sign up to set email alerts
|

Fine-Grained Address Space Layout Randomization on Program Load

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…There are several mechanisms that protect against codereuse attacks: address space layout randomization (ASLR) and its fine-grained version [31], stack canaries, and control-flow integrity techniques. Despite that, code-reuse attacks can be extended to bypass some of them.…”
Section: Introductionmentioning
confidence: 99%
“…There are several mechanisms that protect against codereuse attacks: address space layout randomization (ASLR) and its fine-grained version [31], stack canaries, and control-flow integrity techniques. Despite that, code-reuse attacks can be extended to bypass some of them.…”
Section: Introductionmentioning
confidence: 99%
“…A distinctive feature of this work is the conditions of a model attack. The authors believe that the attacked system contains a set of modern protection tools, such as DEP, ASLR, and even finegrained address space randomization at each run of the application [73]. However, the authors also believe that in the application under attack there are many leaks that reveal the address space of the process.…”
mentioning
confidence: 99%