HackerNews
The Good, the Bad, and the Weird
The Good, the Bad, and the Weird
The Trail of Bits Blog
The Good, the Bad, and the Weird
Let’s automatically identify weird machines in software. Combating software exploitation has been a cat-and-mouse game ever since the Morris worm in 1988. Attackers use specific exploitation primitives to achieve unintended code execution. Major software…