Address space layout randomization (ASLR) is a computer security technique which involves randomly arranging the positions of key data areas, usually including the base of the executable and position of libraries, heap, and stack, in a process's address space.

Benefits

Address space randomization hinders some types of security attack by preventing an attacker being able to easily predict target addresses. For example attackers trying to execute return-to-libc attacks must locate the code to be executed; while other attackers trying to execute shellcode injected on the stack have to first find the stack. In both cases, the related memory addresses are obscured from the attackers; these values have to be guessed, and a mistaken guess is not usually recoverable due to the application crashing.

Effectiveness

Address space layout randomization relies on the low chance of an attacker guessing where randomly placed areas are located; security is increased by increasing the search space. Thus, address space randomization is more effective when more entropy is present in the random offsets. Entropy is increased by either raising the amount of virtual memory area space the randomization occurs over, or reducing the period the randomization occurs over; the period is typically implemented as small as possible, so most systems must increase VMA space randomization.

To defeat the randomization, an attacker must successfully guess the positions of all areas he is attacking. For data areas such as stack and heap, where custom code or useful data can be loaded, more than one state can be attacked by using NOP slides for code or repeated copies of data; this allows an attack to succeed if the area is randomized to one of a handful of values. In contrast, code areas such as library base and main executable need to be discovered exactly. Often these areas are mixed, for example stack frames are injected onto the stack and a library is returned into.

To begin, let us declare the following variables:

:$E_s = mbox\left\{entropy bits of stack top\right\},$:$E_m = mbox\left\{entropy bits of mmap\left(\right) base\right\},$:$E_x = mbox\left\{entropy bits of main executable base\right\},$:$E_h = mbox\left\{entropy bits of heap base\right\},$:$A_s = mbox\left\{attacked bits per attempt of stack entropy\right\},$:$A_m = mbox\left\{attacked bits per attempt of mmap\left(\right) base entropy\right\},$:$A_x = mbox\left\{attacked bits per attempt of main executable entropy\right\},$:$A_h = mbox\left\{attacked bits per attempt of heap base entropy\right\},$:$alpha = mbox\left\{attempts made\right\},$:$N = E_s-A_s + E_m-A_m + E_x-A_x + E_h-A_h,$

To calculate the probability of an attacker succeeding, we have to assume a number of attempts $alpha$ are to be carried out without being interrupted by a signature-based IPS, law enforcement, or other factor; in the case of brute forcing, the daemon cannot be restarted. We also have to figure out how many bits are relevant and how many are being attacked in each attempt, leaving however many bits the attacker has to defeat.

The following formulas represent the probability of success for a given set of $alpha,$ attempts on $N$ bits of entropy.

:$g left \left( alpha, ight \right) = mbox\left\{isolated guessing; address space is re-randomized after each attempt\right\},$:$g left \left( alpha, ight \right) = 1 - \left\{ left \left( 1 - \left\{2^\left\{-N ight \right) ^ alpha,\right\} : 0 le , alpha,$

:$b left \left( alpha, ight \right) = mbox\left\{systematic brute forcing on copies of the program with the same address space\right\}$:$b left \left( alpha, ight \right) = frac\left\{alpha,\right\}$2^N : 0 le , alpha, le , {2^N}

In many systems, $2^N$ can be in the thousands or millions; on modern 64-bit systems, these numbers typically reach the millions at least. For 32-bit systems at 2004 computer speeds which have 16 bits for address randomisation, Shacham and co workers state "... 16 bits of address randomization can be defeated by a brute force attack within minutes." [On the Effectiveness of Address-Space Randomization,Shacham, H. and Page, M. and Pfaff, B. and Goh, E.J. and Modadugu, N. and Boneh, D,Proceedings of the 11th ACM conference on Computer and communications security,pp 298--307, 2004] It should be noted that the authors' statement depends on the ability to attack the same application multiple times without any delay. Proper implementations of ASLR, like that included in grsecurity, provide several methods to make such brute force attacks infeasible. One method involves preventing an executable from executing for a configurable amount of time if it has crashed a certain number of times.

Some systems implement "Library Load Order Randomization", a form of ASLR where the order in which libraries are loaded is randomized. This supplies very little entropy. An approximation of the number of bits of entropy supplied per needed library is shown below; this does not yet account for varied library sizes, so the actual entropy gained is really somewhat higher. Note that attackers usually need only one library; the math is more complex with multiple libraries, and shown below as well. Note that the case of an attacker using only one library is a simplification of the more complex formula for $l = 1$.

:$l = mbox\left\{number of libraries loaded\right\}$:

::

These values tend to be low even for large values of $l$, most importantly since attackers typically can use only the C standard library and thus it can often be assumed . Interestingly, however, even for a small number of libraries there are a few bits of entropy gained here; it is thus potentially interesting to combine library load order randomization with VMA address randomization to gain a few extra bits of entropy. Note that these extra bits of entropy will not apply to other mmap() segments, only libraries.

Reducing entropy

There are several ways for an attacker to reduce the entropy present in a randomized address space, ranging from simple information leaks to attacking multiple bits of entropy per attack. There is little that can be done about this.

It is possible to leak information about memory layout using format string vulnerabilities. Format string functions such as printf() use a variable argument list to do their job; format specifiers describe what the argument list looks like. Because of the way arguments are typically passed, each format specifier moves closer to the top of the stack frame. Eventually, the return pointer and stack frame pointer can be extracted, revealing the address of a vulnerable library and the address of a known stack frame; this can completely eliminate library and stack randomization as an obstacle to an attacker.

It is also possible to decrease entropy in the stack or heap. The stack typically must be aligned to 16 bytes, and so this is the smallest possible randomization interval; while the heap must be page-aligned, typically 4096 bytes. When attempting an attack, it is possible to align duplicate attacks with these intervals; a NOP slide may be used with shellcode injection, and the string '/bin/sh' can be replaced with '////////bin/sh' for an arbitrary number of slashes when attempting to return to "system()". The number of bits removed is exactly $log_2 left \left(n ight \right)$ for $n$ intervals attacked.

Such decreases are limited due to the amount of data that can be stuffed in the stack or heap. The stack, for example, is typically limited to 8MBBDprefix|p=b] and grows to much less; this allows for at most 19 bits, although a more conservative estimate would be around 8-10 bits corresponding to 4-16KBBDprefix|p=b] of stack stuffing. The heap on the other hand is limited by the behavior of the memory allocator; in the case of glibc, allocations above 128KB are created using mmap(), limiting attackers to 5 bits of reduction. This is also a limiting factor when brute forcing; although the number of attacks to perform can be reduced, the size of the attacks is increased enough that the behavior could in some circumstances become anomalous to intrusion detection systems.

History

The first design and implementation (and indeed the coining of the term ASLR) was made public in July, 2001 by the PaX project. It remains the most complete implementation, providing also kernel stack randomization from October 2002 onward. It also continues to provide the most entropy for each randomized layout compared to other implementations. [Comparison of PaX to ExecShield and W^X]

Implementations

Several mainstream, general purpose operating systems implement ASLR.

In Linux, a weak form of ASLR has been enabled by default since kernel version 2.6.12. The PaX and ExecShield patchsets to the Linux kernel provide more complete implementations. Various Linux distributions including Adamantix, Hardened Gentoo, and Hardened Linux From Scratch come with PaX's implementation of ASLR by default.

The Exec Shield patch supplies 19 bits of stack entropy on a period of 16 bytes; and 8 bits of mmap() base randomization on a period of 1 page of 4096 bytes. This places the stack base in an area 8MB wide containing 524288 possible positions; and the mmap() base in an area 1MB wide containing 256 possible positions.

The prelink tool implements randomization at prelink time rather than runtime, due to a deficiency of the design of prelink. The goal of prelink is to handle relocating libraries before the dynamic linker has to, which allows the relocation to occur once for many runs of the program. Because of this, real address space randomization would defeat the purpose of prelinking.

Microsoft's Windows Vista and Windows Server 2008 have ASLR enabled by default, although only for executables and dynamic link libraries which are specifically linked to be ASLR-enabled. A registry setting is available to forcibly enable or disable ASLR for all executables and libraries. [cite web
url=http://taossa.com.nyud.net:8080/archive/bh08sotirovdowd.pdf
title=Bypassing Browser Memory Protections
author=Alexander Sotirov
coauthor=Mark Dowd
date=August 2008
] The locations of the heap, stack, Process Environment Block, and Thread Environment Block are also randomized.

OpenBSD also supports ASLR.

Apple introduced randomization of some library offsets in Mac OS X v10.5 [See "Library Randomization" at http://www.apple.com/macosx/features/300.html#security] , presumably as a stepping stone to fully implementing ASLR at a later date. Their implementation does not provide complete protection against attacks which ASLR is designed to defeat [ [http://securosis.com/2007/10/29/quick-leopard-update/ Quick Leopard Update | securosis.com ] ] [ [http://www.matasano.com/log/981/a-roundup-of-leopard-security-features/ Matasano Chargen » A Roundup Of Leopard Security Features ] ] [ [http://www.matasano.com/log/986/what-weve-since-learned-about-leopard-security-features/ Matasano Chargen » What We’ve Since Learned About Leopard Security Features ] ] [ [http://dvlabs.tippingpoint.com/blog/2007/11/07/leopard-aslr TippingPoint | DVLabs | New Leopard Security Features - Part I: ASLR ] ] .

ee also

* Buffer overflow
* Stack buffer overflow
* Stack-smashing protection
* NX bit
* Information entropy

References

* [http://pax.grsecurity.net/docs/aslr.txt PaX documentation on ASLR]
* [http://grsecurity.net/PaX-presentation_files/frame.htm Comparison of PaX to ExecShield and W^X]
* [http://blogs.msdn.com/michael_howard/archive/2006/05/26/608315.aspx ASLR for Windows Vista beta 2]
* [http://www.wehnus.com ASLR for Windows 2000/XP/2003 (WehnTrust)]
* [http://www.phrack.org/issues.html?issue=59&id=9#article Bypassing PaX ASLR protection]
* [http://portal.acm.org/citation.cfm?id=1030124&dl=ACM&coll=&CFID=15151515&CFTOKEN=6184618 On the effectiveness of address space layout randomization]
* [http://www.eweek.com/article2/0,1895,1969505,00.asp Microsoft Finds (Random) Way to Secure Vista]
* [http://www.eweek.com/article2/0,1895,2071746,00.asp Windows Vista Randomization Gets OEM Thumbs Up]
* [http://discovery.csc.ncsu.edu/~ckil/dsn06fastabstract_v2.pdf Address Space Layout Permutation]

Wikimedia Foundation. 2010.

### Look at other dictionaries:

• Address Space Layout Randomization — L’Address Space Layout Randomization (ASLR) ou randomisation de l espace d adressage est une technique permettant de placer de façon aléatoire les zones de données dans la mémoire virtuelle. Il s agit en général de la position du tas, de la pile …   Wikipédia en Français

• Address Space Layout Randomization — (ASLR)  технология, применяемая в операционных системах, при использовании которой случайным образом изменяется расположение в адресном пространстве процесса важных структур, а именно: образа исполняемого файла, подгружаемых библиотек, кучи… …   Википедия

• Address Space Layout Randomization — (ASLR, auf Deutsch in etwa Zufallsgestaltung des Adressraum Aufbaus) ist eine Technik, die die Ausnutzung von Sicherheitslücken in Computersystemen erschwert. ASLR vergibt den Programmen zufällig die Adressbereiche, somit ist das System praktisch …   Deutsch Wikipedia

• Address space layout randomization — L’Address Space Layout Randomization (ASLR) ou distribution aléatoire de l espace d adressage est une technique permettant de placer de façon aléatoire les zones de données dans la mémoire virtuelle. Il s agit en général de la position du tas, de …   Wikipédia en Français

• Executable space protection — In computer security, executable space protection is the marking of memory regions as non executable, such that an attempt to execute machine code in these regions will cause an exception. It makes use of hardware features such as the NX bit.The… …   Wikipedia

• ASLR — Address space layout randomization L’Address Space Layout Randomization (ASLR) ou randomisation de l espace d adressage est une technique permettant de placer de façon aléatoire les zones de données dans la mémoire virtuelle. Il s agit en général …   Wikipédia en Français

• ASLR — Address Space Layout Randomization (ASLR) ist eine Technik, die die Ausnutzung von Sicherheitslücken in Computersystemen erschwert. ASLR vergibt den Programmen zufällig die Adressbereiche, somit ist das System praktisch nicht mehr deterministisch …   Deutsch Wikipedia

• PaX — In computer security, PaX is a patch for the Linux kernel that implements least privilege protections for memory pages. The least privilege approach allows computer programs to do only what they have to do in order to be able to execute properly …   Wikipedia

• Buffer overflow — In computer security and programming, a buffer overflow, or buffer overrun, is an anomalous condition where a process attempts to store data beyond the boundaries of a fixed length buffer. The result is that the extra data overwrites adjacent… …   Wikipedia

• Mac OS X Lion — Mac OS X v10.7 Lion Part of the Mac OS X family …   Wikipedia