Weird machines, exploitability, and provable unexploitability

Author(s): Thomas F. Dullien
Sponsor(s): IEEE Computer Society
Publisher: IEEE - Institute of Electrical and Electronics Engineers, Inc.
Volume: PP
Page(s): 1
ISSN (Electronic): 2168-6750
DOI: 10.1109/TETC.2017.2785299

Abstracts

Regular

The concept of exploit is central to computer security, particularly in the context of memory corruptions. Yet, in spite of the centrality of the concept and voluminous descriptions of various exploitation techniques or countermeasures, a good theoretical framework for describing and reasoning about exploitation has not yet been put forward.

Advertisement