TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Research paper is also an executable x86 program [pdf]

189 点作者 notmysql_超过 1 年前

17 条评论

Hogarth01超过 1 年前
Here&#x27;s the companion video for the paper: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=LA_DrBwkiJA" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=LA_DrBwkiJA</a>
评论 #38951143 未加载
评论 #38951914 未加载
tak2hu超过 1 年前
Reminds me a PDF which is also bootable x86 image from PoC||GTFO [1], specifically the second issue (0x02) on section 8 “This OS is also a PDF”<p>[1] <a href="https:&#x2F;&#x2F;pocorgtfo.hacke.rs&#x2F;" rel="nofollow">https:&#x2F;&#x2F;pocorgtfo.hacke.rs&#x2F;</a>
lifthrasiir超过 1 年前
Not only that, but it is an executable x86 program <i>written in a printable subset of x86 instructions</i> (so no self-modifying code), as noted in the section 3 with a comparison to the similarly printable EICAR anti-virus test file.
评论 #38954757 未加载
Two9A超过 1 年前
Many years ago, I wrote up a post on doing this kind of thing in plain DOS .com files: <a href="https:&#x2F;&#x2F;imrannazar.com&#x2F;articles&#x2F;x86-printable-opcodes" rel="nofollow">https:&#x2F;&#x2F;imrannazar.com&#x2F;articles&#x2F;x86-printable-opcodes</a><p>It&#x27;s good to see the principle can be expanded to EXEs, I&#x27;ll have to dig into this some more.
tomcam超过 1 年前
Justine is probably adding both targets to the αcτµαlly pδrταblε εxεcµταblε toolchain
huppeldepup超过 1 年前
When he talked about the inability to jump to certain places it reminded me of a powerpoint I read a decade or two back that discussed the disassembly of Skype. They used any and every trick in the book to make disassembly impossible, like calculating an int, feeding it to a cosine instruction and the result would be the jump distance. I tried finding the powerpoint but alas Google is garbage these days, maybe the author can find some hints in there to reduce the amount of code coming out of the compiler.<p>Wish I had come up with this compiler, great stuff.
评论 #38952929 未加载
ChrisMarshallNY超过 1 年前
One of my employees once wrote a specification for his vignette correction algorithm in Postscript.<p>The illustrations and charts were actual examples of his algorithm, being executed at render time.
alchemist1e9超过 1 年前
Lazy question, sorry briefly skimmed the PDF and this doesn’t do this, but hypothetically could one design a PDF file generator technique the produces a spec compliant file that uses this technique to chain load another arbitrary base64 encoded binary stored inside the PDF. Maybe someone has already done that.
CatchSwitch超过 1 年前
I love this guy&#x27;s content so much. Easily one of my favorite programming content creators around
uptheroots超过 1 年前
Tom7 the goat
o11c超过 1 年前
Contrary to what&#x27;s in the paper, I&#x27;m pretty sure IMUL-by-constant is in fact useful, since you can use subtraction:<p><pre><code> x * (a - b) === x * a - x * b </code></pre> and this applies even when losing the top half.
mizzao超过 1 年前
Is it executable by renaming the .txt file to an .exe or what?
评论 #38948395 未加载
评论 #38948369 未加载
codyd51超过 1 年前
This is a very impressive and fun piece of work!
urbandw311er超过 1 年前
What does it do when executed?
评论 #38951124 未加载
sim7c00超过 1 年前
reminds me of PoC || GTFO e-zine stuff :D fun things! cool piece!
dpflan超过 1 年前
Knuth would approve of this literate programming?
tw1984超过 1 年前
hard core science!