After yesterday's discussion about the use of Turing-Complete in exploitation papers, and realizing how commonly the other important term close to my heart, "weird machine", is misunderstood, I wrote a (rather unpolished) blog post about it. addxorrol.blogspot.com/2018/…
8
76
12
151
oh boy, for how many years did i want to write (about) this! another aspect many people miss is that TC computation requires the result on the *same* tape, not some subset of it. think about what it means for exploitation ;).
1
3
6
there's no TC on a finite tape and finite TMs are not at all equal for that same reason. security boundaries are breached when one finite TM breaks out of its own finite tape. i.e., we don't call executing a simpe python script on the python interpreter a security breach per se.
Oct 3, 2018 · 10:58 AM UTC
1
1
2


