Hacker News Comments on
reductio ad absurdum by Christopher Domas
Shakacon LLC
·
Youtube
·
61
HN points
·
0
HN comments
HN Theater has aggregated all Hacker News stories and comments that mention Shakacon LLC's video "reductio ad absurdum by Christopher Domas".
HN Theater Rankings
- This course is unranked · view top recommended courses
Hacker News Stories and Comments
All the comments and stories posted to Hacker News that reference this video.
⬐
⬐ KapuraIt's theoretically interesting up until the point where he starts eliminating registers and moving things to memory addresses. Main memory is significantly slower to access than in-processor registers. Granted, if you are taking the mov-only computation engine to it's logical conclusion (as Domas does) you may be able to speed up the hardware architecture to compensate for these losses, but is there anything of actionable value to gain from such a process?(i did really enjoy the talk, fwiw)
⬐ progval⬐ icebraining> you may be able to speed up the hardware architecture to compensate for these lossesIt reminds me of the concept of Scratchpad memory: https://en.wikipedia.org/wiki/Scratchpad_memory
However, the main issue is with branches. As all code is executed all the time, the execution time is exponential in the number of basic blocks in the control-flow graph C program.
⬐ qubexOISC (One Instruction Set Computing) is a well-known concept in theoretical computer science. It is not considered an avenue for for performance computing.https://en.wikipedia.org/wiki/One_instruction_set_computer?w...
The actual compiler has been discussed in the past on HN [1][2], but I thought the talk was an well structured explanation of the process, and more interesting than the compiler itself.⬐ adrianNI wonder whether mov-oriented programming would a useful obfuscation technique for malware authors. I'd assume that typical disassemblers are not very helpful.⬐ viraptor⬐ igraviousYes/no. Yes, because it's (slightly) harder to see what's executed. No, because AVs will soon get a rule like: basic block full of MOVs - flag it immediately. Some AVs even flag UPX packed executables by default, so it wouldn't be unexpected.⬐ teh_klevAt around 34:30 in the talk he discusses this briefly, with the conclusion that you'd signature the data and also continue to monitor API calls etc. It wouldn't be such a big deal.⬐ juskreyObfuscation uses a lot of techniques including this. Redundancy also allows to create polymorphic code, that is which creates variable copies of itself.⬐ posterboyone talk I remember said as much. If i remember correctly, repeated obfuscation via self modifying code can increase code size dramatically, though a correlation to time complexity was not shown (and I don't remember how the code modified).⬐ missjellyfishThere is the demovfuscator, which de-obfuscates movfuscated programs reasonably well. This work was actually done by friends of mine; see their talk here: https://recon.cx/2016/talks/"Movfuscator-Be-Gone.html⬐ MaxBarracloughInteresting, thanks for the link!Was just about to ask if such a project exists.
I wonder if there are other OISC architectures that are harder to 'decompile'.
More Reductio ad singulum than Reductio ad absurdum :)⬐ utopcellIf anything, this video showcases the importance of doing proper bibliographic research before working on a new problem. SISC (single instruction set computer) or OISC (One Instruction Set Computer) have been in Hennessy and Patterson for dozens of years.⬐ describrionExcept, that wasn't at all the point of this presentation...
⬐
⬐ icebrainingThe actual compiler has been discussed in the past on HN [1][2], but I thought the talk was an well structured explanation of the process, and more interesting than the compiler itself.