Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Networking

    Microsoft Finds (Random) Way to Secure Vista

    By
    Ryan Naraine
    -
    May 30, 2006
    Share
    Facebook
    Twitter
    Linkedin

      A security feature used in the open-source world is now helping to harden Windows Vista against buffer overrun exploits.

      Microsoft has quietly fitted the feature, called ASLR (Address Space Layout Randomization) in Windows Vista Beta 2 as part of a larger plan to make it more difficult to automate attacks against the operating system.

      “Not only is it in Beta 2, its on by default too,” said Michael Howard, senior security program manager at Microsoft in a blog entry announcing the news.

      “We added ASLR pretty late in the game, but we decided that adding it to beta 2 and enabling it by default was important so we can understand how well it performs in the field,” Howard said.

      Howard, who wrote the book on Microsofts highly-touted SDL (Security Development Lifecycle), stressed that ASLR is not a panacea or a replacement for insecure code but said it could serve as a “useful defense” against malware attacks when used in conjunction with other technologies.

      Several open-source security systems —OpenBSD, PaX and Exec Shield – already implement ASLR, which is described as a security feature that randomly arranges the positions of key data areas to prevent malicious hackers from predicting target addresses.

      /zimages/4/28571.gifCan Microsofts Bitlocker Save Us from Ourselves? Click here to find out.

      “[It] is a useful defense because it makes Windows systems look “different” to malware, making automated attacks harder,” Howard said.

      “In short, when you boot a Windows Vista Beta 2 computer, we load system code into different locations in memory. This helps defeat a well-understood attack called return-to-libc, where exploit code attempts to call a system function,” Howard explained.

      He said the job of ASLR is to move these function entry points around in memory so they are in unpredictable locations.

      In the case of Windows Vista Beta 2, a DLL or EXE could be loaded into any of 256 locations, which means an attacker has a one-in-256 chance of getting the address right.

      “In short, this makes it harder for exploits to work correctly,” Howard added.

      In PaX, which implements least privilege protections for memory pages in Linux, ASLR is used to shuffle the stack base and heap base around in virtual memory when enabled.

      This makes it difficult to launch attacks that require the known location of these areas.

      /zimages/4/28571.gifRead more here about the first security patch issued for Windows Vista.

      Microsoft believes that the addition of ASLR in tandem with other major security enhancements in Windows Vista will raise the bar in the fight to thwart malicious hacking attacks.

      Beyond ASLR, Howard pointed to /GS, a compile-time option in Visual C++ that adds stack-based buffer overrun detection. On by default, he said /GS juggles around some of the function arguments and the function stack variable to make some classes of attack harder to pull off.

      In Windows Vista, Howard also mentioned /SafeSEH, Data Execution Protection and Function Pointer Obfuscation as technologies that help to lock down Windows Vista.

      The software giant also released a white paper (available here as a Word doc) to highlight the array of security advancements in Vista.

      They include the use of the SDL process, Windows Service Hardening, mitigating buffer overruns with hardware protection, and kernel patch protection and mandatory driver signing.

      Windows Vista will also feature User Account Control, a new log-on architecture, network access protection, easier smart card deployments, and various technologies to protect against malware and hacker intrusions.

      /zimages/4/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Ryan Naraine
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×