Microsoft’s memory randomization security defense is a little busted in Windows 8, 10

catCategory: Bullshit seen online | com | catTags: None

RIP ROP? Think again

A Carnegie-Mellon CERT researcher has discovered that Microsoft broke some use-cases for its Address Space Layout Randomisation (ASLR) mechanism, designed to severely hamper hackers’ attempts to exploit security bugs.

Source: Microsoft’s memory randomization security defense is a little busted in Windows 8, 10

Related Posts

No Comments, Comment or Ping

Reply to “Microsoft’s memory randomization security defense is a little busted in Windows 8, 10”

Fucking Tech

    "Humans have great technology that could improve their lives. However, humans always fuck up it's implementation through bad management, bad design, rushed releases, no testing, no resources, corruption and just not giving a fuck about anything. In turn, humans remain frustrated, in a life unimproved. Stupid humans."

    -Intercepted alien communication



Subscribe