Integrasi Address Space Layout Randomization (ASLR) Pada Kernel Linux X86 (32bit) Untuk Mencegah Serangan Exploit Buffer Overflow

Rakhmadi Rahman, Ayu Anugra, Widyah Putri Auliya Amin

Abstract

Buffer Overflow consist of two words, namely buffer and overflow. Buffer refers to area data storage, while overflow means overflowing. In simple terms, buffer overflow is a situation where the data storage are receives more data then its capacity. Buffer Overflow can also be interpreted as a frequently used method by hackers to exploit computer application systems. Buffer Overflow can damage the affected program. This is possible causing the program to not function properly, crash, or not at all can be run at all. Damage caused by buffer overflow can disrupts the operating system and causes irrecoverable data loss. Therefore, we must prevent buffer overflow exploit attacks, one of them the way we can do this i by implementing Addresss Space Layout Randomization (ASLR).

Keywords

Buffer Overflow; Address Space Layout Randomization, computer aplication systems, operating system

Full Text:

PDF

References

Aga, M.T.; Austin, T. Smokestack: Thwarting DOP Attacks with Runtime Stack LayoutRandomization. In Proceedings of the 2019 IEEE/ACM International Symposium on Code Generation and Optimization (CGO), Washington, DC, USA, 16–20 February 2019; pp. 26–36. [Google Scholar] [CrossRef]

Jelinek, J. Object Size Checking to Prevent (Some) Buffer Overflows (GCC FORTIFY). 2004. Available online: http://gcc.gnu.org/ml/gcc-patches/2004 09/msg02055.html

Pax Team. PaX Address Space Layout Randomization (ASLR). 2003. Available online: http://pax.grsecurity.net/docs/aslr.txt (accessed on 17 July 2019).

Edge, J. Kernel Address Space Layout Randomization. 2013. Available online: https://lwn.net/Articles/569635

Lefevre, V. Silent Stack-Heap Collision under GNU/Linux. 2014. Available online: https://gcc.gnu.org/ml/gcc-help/2014 07/msg00076.html (accessed on 17 July 2019).

Refbacks

  • There are currently no refbacks.