Predictable Paths: Novel ASLR Bypass Methods and Mitigations
Address Space Layout Randomization (ASLR) is a widely adopted mitigation designed to protect systems against memory corruption attacks by randomizing memory addresses of critical regions; however, its effectiveness is limited by inherent design flaws and platform-specific vulnerabilities. This paper...
Saved in:
| Main Authors: | Bramwell Brizendine, Bhaskar P. Rimal |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/11030573/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
CR-ATTACKER: Exploiting Crash-Reporting Systems Using Timing Gap and Unrestricted File-Based Workflow
by: Seong-Joong Kim, et al.
Published: (2025-01-01) -
Process Injection Using Return-Oriented Programming
by: Bramwell Brizendine, et al.
Published: (2025-01-01) -
Research progress in code reuse attacking and defending
by: Xiangdong QIAO, et al.
Published: (2018-03-01) -
Exploit detection based on illegal control flow transfers identification
by: Ming-hua WANG, et al.
Published: (2014-09-01) -
Timing and Speculative Execution Attacks: Defeating State-of-the-Art Code-Reuse Defenses
by: Zhang Tianning, et al.
Published: (2025-01-01)