'Weird machine'patterns

S Bratus, J Bangert, A Gabrovsky, A Shubina… - … Unifying Design Patterns …, 2014 - Springer
You do not understand how your program really works until it has been exploited. We
believe that computer scientists and software engineers should regard the activity of modern …

Mismorphism: The heart of the weird machine

P Anantharaman, V Kothari, JP Brady… - Security Protocols XXVII …, 2020 - Springer
… on the exposed weird machine; this weird machine may serve as a … to eliminate the weird
machine. LangSec facilitates the … [18] created a taxonomy of LangSec anti-patterns and used it …

Weird machines, exploitability, and provable unexploitability

T Dullien - IEEE Transactions on Emerging Topics in …, 2017 - ieeexplore.ieee.org
… RELATED WORK The concept of a weird machine that will be discussed in this paper has
… The historical pattern has been the publication of a given mitigation, followed by methods to …

Computing with time: Microarchitectural weird machines

D Evtyushkin, T Benjamin, J Elwell, JA Eitel… - Proceedings of the 26th …, 2021 - dl.acm.org
… The Weird Machine concept is an increasingly popular … can be thought of as pattern matching
problem inside the state … 𝑠𝑚0..𝑛 or a more complex pattern that is known to be malicious. …

Computing with Time: Microarchitectural Weird Machines

TS Benjamin, JA Eitel, J Elwell, D Evtyushkin… - Communications of the …, 2024 - dl.acm.org
… The Weird Machine concept is an increasingly popular model for … patterns. When the WG
code attempts to repeatedly mistrain a certain branch, the BPU quickly learns this pattern and …

{“Weird}{Machines”} in {ELF}: A Spotlight on the Underappreciated Metadata

R Shapiro, S Bratus, SW Smith - 7th USENIX Workshop on Offensive …, 2013 - usenix.org
… ABI structures has given rise to a number of design patterns [7]. Not surprisingly, the most …
In order to understand the ELF metadata-driven weird machine present in Linux’s RTLD we …

Mismorphism: The Heart of the Weird Machine

J Blythe, V Kothari, JP Brady, IR Jenkins, S Ali… - 2019 - books.google.com
… to eliminate the weird machine. LangSec facilitates the con… [18] created a taxonomy of
LangSec anti-patterns and used it … as precursors to the weird machine. Our work is motivated by …

Bending microarchitectural weird machines towards practicality

PL Wang, R Paccagnella, RS Wahby… - 33rd USENIX Security …, 2024 - usenix.org
… • We present a weird machine packer that uses Flexo to obfuscate UPX’s [88] unpacking
process. Our packer encrypts the packed executable, which a µWM later decrypts at runtime. …

Attack Surface Measurement: A Weird Machines Perspective

M Levy, F Maldonado - European Interdisciplinary Cybersecurity …, 2024 - dl.acm.org
… The historical pattern has been to publish the mitigation, followed by methods to bypass
the … More generally, we can discern three general classes of weird machine states: human …

The ghost is the machine: Weird machines in transient execution

PL Wang, F Brown, RS Wahby - 2023 IEEE Security and …, 2023 - ieeexplore.ieee.org
… We propose the Transient WM, a weird machine that … to the TSX WM, our weird machine
begins execution when the CPU is … By repeating this pattern, we can create OR gates (Listing 2) …