Move along, nothing to see here
Posted Feb 12, 2005 15:18 UTC (Sat) by spender
In reply to: Move along, nothing to see here
Parent article: Address space randomization in 2.6
Being such an expert on the subject, can you please tell me the number of addressable bytes of memory on the following 64 bit architectures:
Now, since you're also such an expert on the topic, please tell me how many bits of randomization you can provide for the brk-managed heap, the mmap base, and stack for the above architectures.
Please also inform me of how many applications on the above architectures are built 64-bit and thus can make use of such randomization.
Looking forward to your reply.
The "it stops automated remote attacks" position is pretty funny. What about automated bruteforcing remote attacks? Surely that's the next step that will show this feature by itself to be what it is: obscurity. It has more real benefit for other architectures that support the NX bit properly, but if your goal is to provide protection against "automated remote attacks" for the general user, shouldn't your solution be targeted towards the architecture the general user uses?
to post comments)