I was reminded today of how darned well Windows handles relocations and Address Space Layout Randomization. Relocations are 2 bytes each (24 bytes each for Linux) and relocated pages are shared (not shared on Linux). So, ASLR is almost free on Windows, which is good for security
-
-
So, Windows defaults to ASLR which is cheaper (relocated pages shared) but less secure (addresses the same across processes). Does that lead to more exploits on Windows (due to cross-process address consistency) or fewer exploits on Windows (due to higher use of ASLR)? Thoughts?
-
Or do the affected process types just use zygotes thus negating the cost and security differences? I ask because I seem to remember some shell exploits on Linux that were exploitable because ASLR was off, and that seemed weird to me. Disclaimer: I'm not a security expert
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.