TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Research paper is also an executable x86 program [pdf]

189 pointsby notmysql_over 1 year ago

17 comments

Hogarth01over 1 year ago
Here&#x27;s the companion video for the paper: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=LA_DrBwkiJA" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=LA_DrBwkiJA</a>
评论 #38951143 未加载
评论 #38951914 未加载
tak2huover 1 year ago
Reminds me a PDF which is also bootable x86 image from PoC||GTFO [1], specifically the second issue (0x02) on section 8 “This OS is also a PDF”<p>[1] <a href="https:&#x2F;&#x2F;pocorgtfo.hacke.rs&#x2F;" rel="nofollow">https:&#x2F;&#x2F;pocorgtfo.hacke.rs&#x2F;</a>
lifthrasiirover 1 year ago
Not only that, but it is an executable x86 program <i>written in a printable subset of x86 instructions</i> (so no self-modifying code), as noted in the section 3 with a comparison to the similarly printable EICAR anti-virus test file.
评论 #38954757 未加载
Two9Aover 1 year ago
Many years ago, I wrote up a post on doing this kind of thing in plain DOS .com files: <a href="https:&#x2F;&#x2F;imrannazar.com&#x2F;articles&#x2F;x86-printable-opcodes" rel="nofollow">https:&#x2F;&#x2F;imrannazar.com&#x2F;articles&#x2F;x86-printable-opcodes</a><p>It&#x27;s good to see the principle can be expanded to EXEs, I&#x27;ll have to dig into this some more.
tomcamover 1 year ago
Justine is probably adding both targets to the αcτµαlly pδrταblε εxεcµταblε toolchain
huppeldepupover 1 year ago
When he talked about the inability to jump to certain places it reminded me of a powerpoint I read a decade or two back that discussed the disassembly of Skype. They used any and every trick in the book to make disassembly impossible, like calculating an int, feeding it to a cosine instruction and the result would be the jump distance. I tried finding the powerpoint but alas Google is garbage these days, maybe the author can find some hints in there to reduce the amount of code coming out of the compiler.<p>Wish I had come up with this compiler, great stuff.
评论 #38952929 未加载
ChrisMarshallNYover 1 year ago
One of my employees once wrote a specification for his vignette correction algorithm in Postscript.<p>The illustrations and charts were actual examples of his algorithm, being executed at render time.
alchemist1e9over 1 year ago
Lazy question, sorry briefly skimmed the PDF and this doesn’t do this, but hypothetically could one design a PDF file generator technique the produces a spec compliant file that uses this technique to chain load another arbitrary base64 encoded binary stored inside the PDF. Maybe someone has already done that.
CatchSwitchover 1 year ago
I love this guy&#x27;s content so much. Easily one of my favorite programming content creators around
uptherootsover 1 year ago
Tom7 the goat
o11cover 1 year ago
Contrary to what&#x27;s in the paper, I&#x27;m pretty sure IMUL-by-constant is in fact useful, since you can use subtraction:<p><pre><code> x * (a - b) === x * a - x * b </code></pre> and this applies even when losing the top half.
mizzaoover 1 year ago
Is it executable by renaming the .txt file to an .exe or what?
评论 #38948395 未加载
评论 #38948369 未加载
codyd51over 1 year ago
This is a very impressive and fun piece of work!
urbandw311erover 1 year ago
What does it do when executed?
评论 #38951124 未加载
sim7c00over 1 year ago
reminds me of PoC || GTFO e-zine stuff :D fun things! cool piece!
dpflanover 1 year ago
Knuth would approve of this literate programming?
tw1984over 1 year ago
hard core science!