Abstract | ||
---|---|---|
Mismorphisms—instances where predicates take on different truth values across different interpretations of reality (notably, different actors’ perceptions of reality and the actual reality)—are the source of weird instructions. These weird instructions are tiny code snippets or gadgets that present the exploit programmer with unintended computational capabilities. Collectively, they constitute the weird machine upon which the exploit program runs. That is, a protocol or parser vulnerability is evidence of a weird machine, which, in turn, is evidence of an underlying mismorphism. This paper seeks to address vulnerabilities at the mismorphism layer. |
Year | DOI | Venue |
---|---|---|
2019 | 10.1007/978-3-030-57043-9_11 | Security Protocols Workshop |
DocType | Citations | PageRank |
Conference | 0 | 0.34 |
References | Authors | |
0 | 10 |
Name | Order | Citations | PageRank |
---|---|---|---|
Prashant Anantharaman | 1 | 10 | 5.99 |
Vijay Kothari | 2 | 12 | 4.00 |
J. Peter Brady | 3 | 2 | 1.37 |
Ira Ray Jenkins | 4 | 0 | 0.34 |
Sameed Ali | 5 | 2 | 1.78 |
Michael C. Millian | 6 | 0 | 1.35 |
Ross Koppel | 7 | 75 | 13.70 |
Jim Blythe | 8 | 707 | 73.61 |
Sergey Bratus | 9 | 299 | 34.21 |
Sean W. Smith | 10 | 1240 | 205.10 |