Weird machines, exploitability, and provable unexploitability
|Author(s):||Thomas F. Dullien|
|Sponsor(s):||IEEE Computer Society|
|Publisher:||IEEE - Institute of Electrical and Electronics Engineers, Inc.|
The concept of exploit is central to computer security, particularly in the context of memory corruptions. Yet, in spite of the centrality of the concept and voluminous descriptions of various exploitation techniques or countermeasures, a good theoretical framework for describing and reasoning about exploitation has not yet been put forward.