Security
Exploitation (Halvar Flake)
- Phrack
- Stack Smashing
- Heap Overflow
- ASLR
Weird machines, exploitability, and provable unexploitability: http://ieeexplore.ieee.org/stamp/stamp.jsp?reload=true&tp=&arnumber=8226852
Finite State Machines
CPU States:
- Sane
- Transitory
- Weird States
Exploitation Procedure
- Setup (choose the right sane state)
- Instantiation (enter the weird state)
- Programming (program the weird state)
Attacker Specialization
- Different version of the same “host” may create similar weird machines.