Matches in DBpedia 2016-04 for { <http://dbpedia.org/resource/Weird_machine> ?p ?o }
Showing triples 1 to 33 of
33
with 100 triples per page.
- Weird_machine abstract "In computer security, the weird machine is a computational artifact where additional code execution can happen outside the original specification of the program. It is closely related to the concept of weird instructions, which are the building blocks of an exploit based on crafted input data.While expected, valid input activates the normal, intended functionality in a computer program, input that was unexpected by the program developer may activate unintended functionality. The weird machine consists of this unintended functionality that can be programmed with selected inputs in an exploit.In a classical attack taking advantage of a stack buffer overflow, the input given to a vulnerable program is crafted and delivered so that it itself becomes executed as program code. However, if the data areas of the program memory have been protected so that they cannot be executed directly like this, the input may instead take the form of pointers into pieces of existing program code that then become executed in an unexpected order to generate the functionality of the exploit. These snippets of code that are used by the exploit are referred to as gadgets in the context of return-oriented programming.Through interpretation of data as code, weird machine functionality that is by definition outside the original program specification can be reached also by Proof-Carrying Code, which has been formally proven to function in a certain specific way. This disparity is essentially caused by a disconnect between formal abstract modelling of a computer program and its real-world instance, which can be influenced by events that are not captured in the original abstraction, such as memory errors or power outages.Two central categories of mitigation to the problems caused by weird machine functionality include input validation within the software and protecting against problems arising from the platform on which the program runs, such as memory errors. Input validation aims to limit the scope and forms of unexpected inputs e.g. through whitelists of allowed inputs, so that the software program itself would not end up in an unexpected state by interpreting the data internally. Equally importantly, secure programming practices such as protecting against buffer overflows make it less likely that input data becomes interpreted in unintended ways by lower layers, such as the hardware on which the program is executed.".
- Weird_machine thumbnail Weird_machine.png?width=300.
- Weird_machine wikiPageExternalLink Software+Security.
- Weird_machine wikiPageID "43096823".
- Weird_machine wikiPageLength "4032".
- Weird_machine wikiPageOutDegree "18".
- Weird_machine wikiPageRevisionID "655835032".
- Weird_machine wikiPageWikiLink Buffer_overflow.
- Weird_machine wikiPageWikiLink Category:Computer_security_exploits.
- Weird_machine wikiPageWikiLink Computer_program.
- Weird_machine wikiPageWikiLink Computer_programming.
- Weird_machine wikiPageWikiLink Computer_security.
- Weird_machine wikiPageWikiLink Data_validation.
- Weird_machine wikiPageWikiLink Executable_space_protection.
- Weird_machine wikiPageWikiLink Exploit_(computer_security).
- Weird_machine wikiPageWikiLink Proof-carrying_code.
- Weird_machine wikiPageWikiLink Return-oriented_programming.
- Weird_machine wikiPageWikiLink Software_developer.
- Weird_machine wikiPageWikiLink Source_code.
- Weird_machine wikiPageWikiLink Stack_buffer_overflow.
- Weird_machine wikiPageWikiLink File:Weird_machine.png.
- Weird_machine wikiPageUsesTemplate Template:Reflist.
- Weird_machine subject Category:Computer_security_exploits.
- Weird_machine hypernym Artifact.
- Weird_machine type ProgrammingLanguage.
- Weird_machine comment "In computer security, the weird machine is a computational artifact where additional code execution can happen outside the original specification of the program. It is closely related to the concept of weird instructions, which are the building blocks of an exploit based on crafted input data.While expected, valid input activates the normal, intended functionality in a computer program, input that was unexpected by the program developer may activate unintended functionality.".
- Weird_machine label "Weird machine".
- Weird_machine sameAs Q18394802.
- Weird_machine sameAs m.010x94wy.
- Weird_machine sameAs Q18394802.
- Weird_machine wasDerivedFrom Weird_machine?oldid=655835032.
- Weird_machine depiction Weird_machine.png.
- Weird_machine isPrimaryTopicOf Weird_machine.