Math with Mathematica

I learned mathematics a different way because of programs like Mathematica. While an undergrad, after lunch I would sometimes loiter in the otherwise off-limits graduate math library. One afternoon I stumbled on Moses’s ACM article on symbolic simplification followed, a few pages down, by his other article Symbolic integration: the stormy decade.…

Keep reading

The instruction set of the x86 is too complicated

When reading the report of an exploit by a security firm, one invariably finds x86 assembly code. I would stumble on xbegin mayEnd cmp mutex, 0 jz weAreDone xabort $0xff and not be sure what it did. Long ago I had programmed other chips in assembly, so I felt a day or two would give me some idea of the assembly language for the Intel chips.…

Keep reading

Cube roots from the square root

Last week while rummaging through some old boxes I stumbled on a notebook with a curious algorithm for computing the cube root using a pocket calculator that has a square root button. For the cube root of 8 it goes:…

Keep reading

It takes days to find it

To find something anomalous one needs to be able to describe what is common. At PermissionBit we do that by recording every interaction between the CPU and the hardware (every system call). That gives us enough data to identify hacking, malware, and misuse.…

Keep reading

What is your computer doing?

Over four years ago one of our clients from IPS came to us with a cyber security problem. We were asked to take their task not as a symptom to alleviate, but as a reflection of a deeper problem to solve.…

Keep reading