TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Big problems with ASLR in Ice Cream Sandwich

63 pointsby trhaynesover 13 years ago

2 comments

tytsoover 13 years ago
The problems which were pointed out are good ones, and they should be fixed. Fortunately, they are easy to fix.<p>In the grand scheme of things, though, this isn't as bad as it seems, since the vast majority of Android applications run in the Dalvik JVM. Hence the amount of code that is subject to weaknesses that could be exploited by the attacker to cause a jump into the non-randomized dynamic loader (for example) are much smaller.<p>Of course, there could still be bugs in native code applications, libraries, and system executables, so the ALSR should definitely be improved. Again, fortunately, this should be relatively easy to do.
评论 #3604693 未加载
评论 #3604283 未加载
malkiaover 13 years ago
So how does the ASLR work with images optimized to be loaded at specific address? (-fPIC all of them?)<p>I was under the impression that if you have two or more instances of the same .so/.dll/.dylibs in different processes, and they end up using different virtual addresses then they can't share the same code page. Maybe I'm behind times...
评论 #3605333 未加载
评论 #3604534 未加载