4 years ago
p3k dots

Hardly understand a thing but the title is just too amazing.

Weird Machines, Exploitability, and Provable Unexploitability (via googleprojectzero.blogspot.com).

The concept of exploit is central to computer security, particularly in the context of memory corruptions. Yet, in spite of the centrality of the concept and voluminous descriptions of various exploitation techniques or countermeasures, a good theoretical framework for describing and reasoning about exploitation has not yet been put forward.