Get the latest tech news

The good, the bad, and the weird (2018)


Let’s automatically identify weird machines in software. Combating software exploitation has been a cat-and-mouse game ever since the Morris worm in 1988. Attackers use specific exploitation primit…

I discussed the use of weird machines to either bypass these mitigation barriers or prove a program is unexploitable as part of the DARPA Risers session to an audience of PMs and other Defense officials earlier this year at the D60 conference. 2016 saw the introduction of Control Flow Guard (CFG) with Windows 8.1/10, which validates forward-edges of indirect branches point to a set of approved functions. Given a set of possible execution paths and their pattern of object creation and access, we must identify program slices with specific and controllable side effects.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of good

good

Related news:

News photo

Silicon Valley leaders are once again declaring ‘DEI’ bad and ‘meritocracy’ good — but they’re wrong

News photo

SVG: The Good, the Bad, and the Ugly (2021)

News photo

The Beyond Good and Evil remaster will be released next week (for real)