Memory randomization as application security enhancement?
        Posted  
        
            by Paul Sasik
        on Stack Overflow
        
        See other posts from Stack Overflow
        
            or by Paul Sasik
        
        
        
        Published on 2010-04-21T19:30:58Z
        Indexed on 
            2010/04/21
            19:33 UTC
        
        
        Read the original article
        Hit count: 284
        
I recently came upon a Microsoft article that touted new "defensive enhancements" of Windows 7. Specifically:
- Address space layout randomization (ASLR)
 - Heap randomization
 - Stack randomization
 
The article went on to say that "...some of these defenses are in the core operating system, and the Microsoft Visual C++ compiler offers others" but didn't explain how these strategies would actually increase security.
Anyone know why memory randomization increases security, if at all? Do other platforms and compilers employ similar strategies?
© Stack Overflow or respective owner