Presented at the 4th XoveTIC Conference, A Coruña, Spain, 7–8 October 2021[Abstract] Memory management is one of the main tasks of an Operating System, where the data of each process running in the system is kept. In this context, there exist several types of attacks that exploit memory-related vulnerabilities, forcing Operating Systems to feature memory protection techniques that make difficult to exploit them. One of these techniques is ASLR, whose function is to introduce randomness into the virtual address space of a process. The goal of this work was to measure, analyze and compare the behavior of ASLR on the 64-bit versions of Windows 10 and Ubuntu 18.04 LTS. The results have shown that the implementation of ASLR has improved signific...
Code injection attacks are a top threat to today's Internet. With zero-day attacks on the rise,...
Many countermeasures exist that attempt to protect against buffer overflow attacks on applications w...
Code reuse attacks such as return-oriented programming are one of the most powerful threats to conte...
This paper examines the security provided by different implementations of Address Space Layout Rando...
ASLR is no longer a strong defense in itself, but it still serves as a foundation for sophisticated ...
To strengthen systems against code injection attacks, the write or execute only policy (W + X) and a...
Abstract. Address Space Layout Randomization (ASLR) is a widely used technique for the prevention of...
Modern systems rely on Address-Space Layout Ran-domization (ASLR) and Data Execution Prevention (DEP...
Abstract—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X...
Abstract—Fine-grained address space layout randomization (ASLR) has recently been proposed as a meth...
Fine-grained address space layout randomization (ASLR) has recently been proposed as a method of eff...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
Software that is in use and under development today still contains as many bugs as ever. These bugs ...
Code reuse attacks such as return-oriented programming are one of the most powerful threats to conte...
Graphics processing units (GPUs) have become a widely used technology for various purposes. While th...
Code injection attacks are a top threat to today's Internet. With zero-day attacks on the rise,...
Many countermeasures exist that attempt to protect against buffer overflow attacks on applications w...
Code reuse attacks such as return-oriented programming are one of the most powerful threats to conte...
This paper examines the security provided by different implementations of Address Space Layout Rando...
ASLR is no longer a strong defense in itself, but it still serves as a foundation for sophisticated ...
To strengthen systems against code injection attacks, the write or execute only policy (W + X) and a...
Abstract. Address Space Layout Randomization (ASLR) is a widely used technique for the prevention of...
Modern systems rely on Address-Space Layout Ran-domization (ASLR) and Data Execution Prevention (DEP...
Abstract—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X...
Abstract—Fine-grained address space layout randomization (ASLR) has recently been proposed as a meth...
Fine-grained address space layout randomization (ASLR) has recently been proposed as a method of eff...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
Software that is in use and under development today still contains as many bugs as ever. These bugs ...
Code reuse attacks such as return-oriented programming are one of the most powerful threats to conte...
Graphics processing units (GPUs) have become a widely used technology for various purposes. While th...
Code injection attacks are a top threat to today's Internet. With zero-day attacks on the rise,...
Many countermeasures exist that attempt to protect against buffer overflow attacks on applications w...
Code reuse attacks such as return-oriented programming are one of the most powerful threats to conte...