as insecure compilation • Many exploit authors think
about hacking as an exercise of
“programming a weird machine”
of unintended functionality
enabled by unexpected inputs • These “weird behaviors” or
“emergent computations” are
system behaviors that emerge
from implementation artifacts,
design mistakes, or adversarial
environments. • Understanding the weird behaviors of a system and their characteristics is crucial to understanding its vulnerability. 3 Implementing a virtual machine using out-of-bounds memory operations in bitmap decoding. “A deep dive into an NSO zero- click iMessage exploit: Remote Code Execution,” Ian Beer & Samuel Groß of Google Project Zero. Jennifer Paykin, Eric Mertens, Mark Tullsen, Luke Maurer, Benoît Razet, and Scott Moore, PriSC 2022.