as insecure compilation • Many exploit authors think 
 about hacking as an exercise of 
 “programming a weird machine” 
 of unintended functionality 
 enabled by unexpected inputs • These “weird behaviors” or 
 “emergent computations” are 
 system behaviors that emerge 
 from implementation artifacts, 
 design mistakes, or adversarial 
 environments. • Understanding the weird behaviors of a system and their characteristics is crucial to understanding its vulnerability. 3 Implementing a virtual machine using out-of-bounds memory operations in bitmap decoding. “A deep dive into an NSO zero- click iMessage exploit: Remote Code Execution,” Ian Beer & Samuel Groß of Google Project Zero. Jennifer Paykin, Eric Mertens, Mark Tullsen, Luke Maurer, Benoît Razet, and Scott Moore, PriSC 2022.