ASLR in Windows

Windows supports Address Sace Layout Randomization (ASLR). [WindowsInternalarrow-up-right] [1] desribes the detail on how executable images, DLL, stack, heap are randomized.

Figure 3-1 Windows OS space layout, source: [WindowsInternalarrow-up-right] [1]

[ASLR1arrow-up-right][2] shows the Windows8 HE-ASLR design and entropy number.

Figure 3-2 Win8 HE-ASLR, source: [ASLR1arrow-up-right][2]

[ASLR2arrow-up-right][3] shows different image layouts during boot.

The following Diagram showing how the physical memory location of various system DLLs changes between a first and second boot

Figure 3-3 Image layout during boot, source: [ASLR2arrow-up-right][3]

[1] [WindowsInternalarrow-up-right] Windows Internals, 6th edition, Mark E. Russinovich, David A. Solomon, Alex Ionescu, 2012, Microsoft Press. ISBN-13: 978-0735648739/978-0735665873

[2][ASLR1arrow-up-right] Exploit Mitigation Improvements in Windows 8, Ken Johnson, Ma, Miller

[3][ASLR2arrow-up-right] Enhance Memory Protections in IE10

Last updated