The goal of this lab is to implement a minimal ASLR for Minix.
The lab consists of three tasks:
Demonstrate that the program in /usr/games/overflow has a vulnerability due to a buffer overflow
Modify Minix (Kernel, user lib, services, etc) to randomize position of stack and heap of processes. Each process should be randomized differently.
Demonstrate that ASLR counters the attack
Submission consists of
A commit of your repository. Tag the commit the "Exercise v.1"
If you resubmit your solution, tag the new commit with "Exercise v.x"
If your project target a different open source software you must agree with Roberto for a different assignment. The goal of the assignment is to demonstrate that you can navigate the code of the project and apply some modifications.
Det går inte att ändra en matris efter att du börjat använda den.