2.1 Verify Memory Protection Mechanisms
2.1 – Verify Memory Protection Mechanisms
Requirement Description
Verify that memory protection mechanisms, specifically ASLR (Address Space Layout Randomization) and DEP (Data Execution Prevention), are supported and enabled by the embedded/IoT operating system used in the DUT, if applicable. These controls help mitigate memory corruption attacks such as buffer overflows and code injection.
DUT Confirmation Details
OEM Statement: (Insert vendor confirmation of ASLR/DEP support and enablement status.)
Observed State: (Insert findings after testing and validation.)
DUT Software Details
Operating System/Kernel Version: ___________________
Build Date: ___________________
Firmware/Software Version: ___________________
Hash Checksum Verification for DUT’s Software Image
Algorithm Used: SHA-256 (or equivalent)
Expected Hash: ___________________
Calculated Hash: ___________________
Result: Pass / Fail
DUT Configuration
(Insert configuration commands, outputs, or settings used to confirm ASLR and DEP enablement.) Example:
cat /proc/sys/kernel/randomize_va_space
dmesg | grep -i NX
grep -i execstack /proc/*/maps
Pre-Conditions
The vendor shall provide:
A signed declaration of memory protection mechanisms (ASLR, DEP, etc.) available on the device and their current status (enabled/disabled).
Test Plan
Total Number of Test Cases: 1
Planned Test Case:
BIS-2.1.1 – Verification of ASLR and DEP enablement through system inspection and behavior testing.
Test-bed Diagram with Interfaces and IPs
(Attach diagram showing DUT, terminal/console interface, debugger (if used), and any supporting tools used to verify memory protection features.)
Last updated
Was this helpful?