Get a Pentest and security assessment of your IT network.

News

Analyzing ASLR in Android Ice Cream Sandwich 4.0

ASLR randomizes where various areas of memory (eg. stack, heap, libs, etc) are mapped in the address space of a process. Combined with complementary mitigation techniques such as non-executable memory protection (NX, XN, DEP, W%%%X, whatever you want to call it), ASLR makes the exploitation of traditional memory corruption vulnerabilities probabilistically difficult. ASLR is commonly an all-or-nothing proposition. If ASLR isn t applied to all areas in a process, its effectiveness is often nullified.

Source: https://threatpost.com/analyzing-aslr-android-ice-cream-sandwich-40-022112/76239/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

IntelCrawler profiled Syrian Electronic Army group

News

Wikileaks Vault 7 Imperial projects revealed the 3 hacking tools Achilles, SeaPea and Aeris