Statements (19)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:concept
|
| gptkbp:describes |
unexpected computational model
|
| gptkbp:enables |
arbitrary code execution
|
| gptkbp:field |
computer security
|
| gptkbp:firstDescribed |
2011
|
| gptkbp:originatedIn |
Anna Shubina
Michael E. Locasto Sergey Bratus Sven M. Hallberg |
| gptkbp:relatedTo |
gptkb:security
gptkb:Technical_Machine software bugs control flow hijacking exploitation primitives |
| gptkbp:studiedIn |
cybersecurity research
|
| gptkbp:usedIn |
exploitation
|
| gptkbp:bfsParent |
gptkb:Treponem_Pal
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Weird Machine
|