Title
Mismorphism: The Heart of the Weird Machine
Abstract
Mismorphisms—instances where predicates take on different truth values across different interpretations of reality (notably, different actors’ perceptions of reality and the actual reality)—are the source of weird instructions. These weird instructions are tiny code snippets or gadgets that present the exploit programmer with unintended computational capabilities. Collectively, they constitute the weird machine upon which the exploit program runs. That is, a protocol or parser vulnerability is evidence of a weird machine, which, in turn, is evidence of an underlying mismorphism. This paper seeks to address vulnerabilities at the mismorphism layer.
Year
DOI
Venue
2019
10.1007/978-3-030-57043-9_11
Security Protocols Workshop
DocType
Citations 
PageRank 
Conference
0
0.34
References 
Authors
0
10
Name
Order
Citations
PageRank
Prashant Anantharaman1105.99
Vijay Kothari2124.00
J. Peter Brady321.37
Ira Ray Jenkins400.34
Sameed Ali521.78
Michael C. Millian601.35
Ross Koppel77513.70
Jim Blythe870773.61
Sergey Bratus929934.21
Sean W. Smith101240205.10