1. 6

  2. 4

    After the ASLR so useful addition, next in the series of the buzzword-compliant checkboxes is the stack addresses randomization.


    Considering the goal of randomizing the addresses of strings and main thread initial frame, moving the main stack area in the address space is not feasible.

    Yet again, HardenedBSD proves this to be false. We’re the only BSD to truly randomize the top of the stack. By combining randomized stack top with a random stack gap, HardenedBSD is able to introduce 41 bits of entropy into the stack.