On Mon, Mar 25, 2013 at 2:52 PM, PaX Team <pagee...@freemail.hu> wrote:
> On 25 Mar 2013 at 9:01, Kfir Lavi wrote:
>
>> Hi,
>> I'm looking for a way to reduce glibc code size.
>> It can be a way to make system smaller and minimize the impact
>> of attack vectors in glibc, as in return-to-libc attack.
>
> study this and draw your conclusions whether the whole exercise is
> worth it or not:
>
> https://www.usenix.org/conference/usenix-security-11/q-exploit-hardening-made-easy
>
>
Thanks for sharing this talk. I didn't know that the program image in
Linux is not randomize by ASLR.
What i understand from this talk: I can probably take a lot of code
out of glibc, but it will never be less then 20K, which lets attacker
that is able to jump to glibc, to construct his ROP program.
As I don't have much experience in security, my question would be: Can
we deploy another mechanism to fight this ROP program building from
the program image?

Thanks,
Kfir

Reply via email to