commit 7933df3678b57cdd4aef00236ca83a0c3217376c
parent c788b696c52654dbbd399f63a72f3839886bd66c
Author: Anselm R Garbe <anselm@garbe.us>
Date: Fri, 18 Mar 2011 11:27:16 +0000
added link to interesting attack
Diffstat:
2 files changed, 5 insertions(+), 1 deletion(-)
diff --git a/sta.li/faq.md b/sta.li/faq.md
@@ -81,6 +81,9 @@ of glibc when possible). This leads to an increased likelihood
of lesser vulnerabilities, simply because lesser code contains fewer bugs from
a statistical point of view.
+See also:
+* [On the Effectiveness of Address-Space Randomization](http://benpfaff.org/papers/asrandom.pdf)
+
Aren't statically linked executables consuming more memory?
--------------------------------------------------------
We believe that due to the small size of the base system the opposite will be
@@ -132,5 +135,5 @@ See also
--------
* <http://teddziuba.com/2008/09/a-web-os-are-you-dense.html>
* <http://www.nth-dimension.org.uk/pub/BTL.pdf>
-
+* [On the Effectiveness of Address-Space Randomization](http://benpfaff.org/papers/asrandom.pdf)
diff --git a/sta.li/index.md b/sta.li/index.md
@@ -82,6 +82,7 @@ Some related links
* [ldd arbitrary code execution](http://www.catonmat.net/blog/ldd-arbitrary-code-execution/) - Nice exploit
* [static linking](http://blog.garbe.us/2008/02/08/01_Static_linking/) - My old blog entry
* [blog post about stali](http://elevenislouder.blogspot.com/2010/02/stali.html)
+* [On the Effectiveness of Address-Space Randomization](http://benpfaff.org/papers/asrandom.pdf)
Credit
------