Search⌘ K
AI Features

Secure Memory

Explore how secure memory techniques such as address space layout randomization and data execution prevention protect devices from memory-related attacks. Understand containerization, virtualization, and sandboxing concepts that isolate software to reduce risk. This lesson equips you with knowledge to strengthen endpoint security using modern OS-based protections.

Overview

Several security solutions have been integrated into operating systems, providing new and innovative ways to protect a device from attacks. New protection mechanisms are discovered as a result of analyzing past attacks. Microsoft has received a priceless education in dealing with security issues with its software. As a result, they can be considered one of the most security-aware software vendors today.

Address space layout randomization (ASLR)

Address space layout randomization (ASLR) was developed in response to attackers taking advantage of how operating systems used memory. Attackers were able to determine where in-memory objects were stored. The locations were the same regardless of what computer was used because the software loaded objects in memory the same way every time due to how software and operating systems used memory. This made the memory predictable, which allowed ...