TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Big problems with ASLR in Ice Cream Sandwich

63 点作者 trhaynes超过 13 年前

2 条评论

tytso超过 13 年前
The problems which were pointed out are good ones, and they should be fixed. Fortunately, they are easy to fix.<p>In the grand scheme of things, though, this isn't as bad as it seems, since the vast majority of Android applications run in the Dalvik JVM. Hence the amount of code that is subject to weaknesses that could be exploited by the attacker to cause a jump into the non-randomized dynamic loader (for example) are much smaller.<p>Of course, there could still be bugs in native code applications, libraries, and system executables, so the ALSR should definitely be improved. Again, fortunately, this should be relatively easy to do.
评论 #3604693 未加载
评论 #3604283 未加载
malkia超过 13 年前
So how does the ASLR work with images optimized to be loaded at specific address? (-fPIC all of them?)<p>I was under the impression that if you have two or more instances of the same .so/.dll/.dylibs in different processes, and they end up using different virtual addresses then they can't share the same code page. Maybe I'm behind times...
评论 #3605333 未加载
评论 #3604534 未加载