Saturday, 23 March 2013

Techniques to Bypass ASLR-DEP

Data Execution Prevention (DEP) is a security feature included in modern operating systems. It is known to be available in Linux, Mac OS X, and Microsoft Windows operating systems and is intended to prevent an application or service from executing code from a non-executable memory region. Whereas Address space layout randomization (ASLR) is a computer security technique which involves randomly arranging the positions of key data areas, usually including the base of the executable and position of libraries, heap, and stack, in a process’s address space.

Security researchers have spent a lot of time in researching and developing techniques to bypass these security mechanism. Today, we would like to present an advanced research paper based on bypassing ASLR/DEP by Mr. Vinay Katoch who is a Vulnerability Research Specialist at Secfence Technologies. The paper emphasis on techniques that can be used to break these advanced security shields. This paper also throws light on Microsoft’s EMET, Enhanced Mitigation Experience Tool kit’s strength. The paper can be read from here.


Contact => www.facebook.com/ryan.manjothi

0 comments:

Post a Comment

Pages