BugTraq
RE: Observation on randomization/rebiasing... Feb 06 2003 08:43AM
Michael Wojcik (Michael Wojcik microfocus com) (1 replies)
> From: Jason Coombs [mailto:jasonc (at) science (dot) org [email concealed]]
> Sent: Wednesday, February 05, 2003 5:08 PM

> A properly security-hardened binary DOES NOT require support
> for arbitrary relocations, arbitrary dynamic library injection,
> arbitrary code injection resulting in new execute paths defined at
> run-time, and the type of programmability required by software
> developers. Once code has been compiled and linked, even when that
> code makes use of dynamic libraries, there is no longer any unknown.

There are plenty of examples of programs and libraries that by design load
and execute independently-developed code: browser plugins, ISAPI, and so
forth. Leaving aside for the moment the question of whether this is a Good
Thing, or whether it fits someone's definition of "a properly
security-hardened binary", it's certainly a popular approach. The security
community has not to date had much luck convincing users and programmers to
adopt even its uncontroversial recommendations; I doubt you'll get any
traction with this one.

Michael Wojcik
Principal Software Systems Developer, Micro Focus

[ reply ]
RE: Observation on randomization/rebiasing... Feb 06 2003 05:21PM
Jason Coombs (jasonc science org)


 

Privacy Statement
Copyright 2010, SecurityFocus