Sophisticated attackers could soon adopt an innovative technique for bypassing one of the most effective mechanisms for preventing a Windows security breach, researchers say.

The protective technique is called the Address Space Layout Randomization (ASLR). ASLR scrambles the memory positions of key elements of a program, such as the base of the executable and the positions of the stack, heap and libraries. This makes it difficult for an attacker to guess where these elements reside in order to exploit them.

The link for this article located at CSO Online is no longer available.