Outbound Link Summary:
Network 3000:
4 years ago

Hardly understand a thing but the title is just too amazing.
Weird Machines, Exploitability, and Provable Unexploitability (via googleprojectzero.blogspot.com).
The concept of exploit is central to computer security, particularly in the context of memory corruptions. Yet, in spite of the centrality of the concept and voluminous descriptions of various exploitation techniques or countermeasures, a good theoretical framework for describing and reasoning about exploitation has not yet been put forward.