add ASLR.

Change-Id: I56d8384c58bc6d60e8a2c683bd36d87dbd08da06
diff --git a/src/tech/security/index.md b/src/tech/security/index.md
index e64e987..054a70b 100644
--- a/src/tech/security/index.md
+++ b/src/tech/security/index.md
@@ -319,6 +319,7 @@
 exploit. The Android SDK, compilers, and OS use tools to make common memory
 corruption issues significantly harder to exploit, including:
 
++ Address Space Layout Randomization (ASLR) to randomize key locations in memory
 + Hardware-based No eXecute (NX) to prevent code execution on the stack and heap
 + ProPolice to prevent stack buffer overruns
 + safe_iop to reduce integer overflows