intrinsic-propensity / turing-machineLinks
A Python program implementing and exploiting the Minsky Turing machine considered in the paper "Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine" as per CVE-2021-32471 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32471)
☆78Updated 3 years ago
Alternatives and similar repositories for turing-machine
Users that are interested in turing-machine are comparing it to the libraries listed below
Sorting:
- ☆114Updated 2 years ago
- GIF displaying its own MD5 (hashquine)☆77Updated 5 years ago
- Attempts at fuzzing Python unpicklers☆39Updated last year
- Proof-of-concept for Spook.js☆70Updated 4 years ago
- Docs and resources on CPU Speculative Execution bugs☆376Updated 7 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- ☆20Updated 3 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆172Updated last year
- Official QEMU mirror☆30Updated last month
- ☆112Updated 2 years ago
- ☆78Updated 4 years ago
- A possible method for faster-than-light communication☆43Updated last year
- ☆95Updated 2 years ago
- Implementation of https://eprint.iacr.org/2021/232☆94Updated 4 years ago
- Basic SAT model of x86 instructions using Z3, autogenerated from Intel docs