Feature request: randomize code layout with selfrando #10416

issue kewde opened this issue on May 17, 2017
  1. kewde commented at 2:00 PM on May 17, 2017: contributor

    selfrando can be used to harden your software beyond what is possible with current mitigations. Inspired by biodiversity in nature and existing randomizing defenses, selfrando varies the attack surface, i.e., the code layout, by randomizing each function separately. This makes exploit writing harder and increases resilience to information leakage relative to traditional address space layout randomization (ASLR) techniques. https://github.com/immunant/selfrando

    The white paper: https://www.ics.uci.edu/~perl/pets16_selfrando.pdf Note: he paper states that it doesn't interfere with deterministic builds.

    The implemention instructions make it seems easy. https://github.com/immunant/selfrando/blob/master/docs/linux-build-instructions.md

    Tor has enabled selfrando on their linux 64bit builds, I believe support for windows and 32 bit is currently being developed. https://blog.torproject.org/blog/tor-browser-70a4-released

  2. fanquake commented at 2:01 PM on May 17, 2017: member

    Thanks, looks like a duplicate of #8370

  3. fanquake closed this on May 17, 2017

  4. MarcoFalke locked this on Sep 8, 2021
Contributors

github-metadata-mirror

This is a metadata mirror of the GitHub repository bitcoin/bitcoin. This site is not affiliated with GitHub. Content is generated from a GitHub metadata backup.
generated: 2026-04-29 03:15 UTC

This site is hosted by @0xB10C
More mirrored repositories can be found on mirror.b10c.me