This is the
talk page for discussing improvements to the
Address space layout randomization article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google ( books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives:
1Auto-archiving period: 90 days
![]() |
![]() | This article is rated C-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||||||||||
|
This page has archives. Sections older than 90 days may be automatically archived by Lowercase sigmabot III when more than 3 sections are present. |
First use:
Entropy is increased by either raising the amount of virtual memory area space over which the randomization occurs or reducing the period over which the randomization occurs. The period is typically implemented as small as possible, so most systems must increase VMA space randomization.
Second use:
Interestingly, however, even for a small number of libraries there are a few bits of entropy gained here; it is thus potentially interesting to combine library load order randomization with VMA address randomization to gain a few extra bits of entropy. Note that these extra bits of entropy will not apply to other mmap() segments, only libraries.
Apparently it either stands for Virtual Memory Address or Virtual Memory Area, but note that neither of these are listed on the VMA disambiguation page. — MaxEnt 13:44, 26 September 2017 (UTC)
The second and third citations used to back-up the claim that OpenBSD was the first major operating system to to support ASLR don't actually provide dates for such thing. I'm thinking they need to be removed and substituted for something else. Is that too much preciousness?
-- Slpk ( talk) 02:15, 15 May 2019 (UTC)
The redirect
Hardened BSD has been listed at
redirects for discussion to determine whether its use and function meets the
redirect guidelines. Readers of this page are welcome to comment on this redirect at
Wikipedia:Redirects for discussion/Log/2023 July 29 § Hardened BSD until a consensus is reached.
Greatder (
talk)
11:20, 29 July 2023 (UTC)
This is the
talk page for discussing improvements to the
Address space layout randomization article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google ( books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives:
1Auto-archiving period: 90 days
![]() |
![]() | This article is rated C-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||||||||||
|
This page has archives. Sections older than 90 days may be automatically archived by Lowercase sigmabot III when more than 3 sections are present. |
First use:
Entropy is increased by either raising the amount of virtual memory area space over which the randomization occurs or reducing the period over which the randomization occurs. The period is typically implemented as small as possible, so most systems must increase VMA space randomization.
Second use:
Interestingly, however, even for a small number of libraries there are a few bits of entropy gained here; it is thus potentially interesting to combine library load order randomization with VMA address randomization to gain a few extra bits of entropy. Note that these extra bits of entropy will not apply to other mmap() segments, only libraries.
Apparently it either stands for Virtual Memory Address or Virtual Memory Area, but note that neither of these are listed on the VMA disambiguation page. — MaxEnt 13:44, 26 September 2017 (UTC)
The second and third citations used to back-up the claim that OpenBSD was the first major operating system to to support ASLR don't actually provide dates for such thing. I'm thinking they need to be removed and substituted for something else. Is that too much preciousness?
-- Slpk ( talk) 02:15, 15 May 2019 (UTC)
The redirect
Hardened BSD has been listed at
redirects for discussion to determine whether its use and function meets the
redirect guidelines. Readers of this page are welcome to comment on this redirect at
Wikipedia:Redirects for discussion/Log/2023 July 29 § Hardened BSD until a consensus is reached.
Greatder (
talk)
11:20, 29 July 2023 (UTC)