top button
Flag Notify
    Connect to us
      Site Registration

Site Registration

Linux : What is address space layout randomization in linux ?

0 votes

I came under a term "address space layout randomization" ? What is the meaning of it ?

Can any one give any example on it how it works and what happens in this feature ?

posted Jul 4, 2014 by Sachidananda Sahu

Share this question
Facebook Share Button Twitter Share Button LinkedIn Share Button

1 Answer

+2 votes

Address Space Layout Randomization is an exploit mitigation technique which randomizes the process’ memory space in order to prevent the attacker from finding the addresses of functions or peripherals. One require the address of these to exploit them successfully.

Now coming to Linux, ASLR is available in Linux from kernel 2.6.12 and is forced on every executable.

Linux ASLR can be configured through /proc/sys/kernel/randomize_va_space. Supported values are -

0 – No randomization.
1 – Only Shared libraries, stack, mmap(), VDSO and heap are randomized.
2 – Full randomization. Addition to point 1 memory managed through brk() is also randomized.

answer Jul 4, 2014 by Tapesh Kulkarni
Thanks for reply...
But the reason behind asking question is what kind of randomization he is doing with the memory space and how it does and why it is required ?
I think I have already answered why it is required, now coming to kind of randomization - the catch is without randomization is linear memory setting and easy to guess/find the location of function and if it is non predictable then it is not. (AFAIK the algo must be simple for the randomization).

By the way the same was adopted in windows based OSs too later.
Okay thanks Tapesh
Similar Questions
0 votes

While reading shared library and PLT (Procedure Linkage Table) I came under a term Trampolines arrangement.

can any one share some info on it ?

+3 votes

Is there any way to get the original source code from binary ?