Interesting interpretation of Cylon uber-hacking skills

SF: discuss futuristic sci-fi series, ideas, and crossovers.

Moderator: NecronLord

Post Reply
User avatar
Battlehymn Republic
Jedi Council Member
Posts: 1828
Joined: 2004-10-27 01:34pm

Interesting interpretation of Cylon uber-hacking skills

Post by Battlehymn Republic »

I whole-heartedly recommend the nBSG fanfic, "Lost Kin" by imjustaguy, which could be found here. Basically, the story is about the Colonial fleet discovering a huge Terran empire, which have much powerful ships than the BSG people but much more vulnerable computer systems.

Why am I posting this in other sci-fi instead of fanfiction? While I'm not trying to pass this off as canon or anything stupid like that, I'm just wondering if the author's interpretation the Cylons' hacking abilites bears any merit, in the realm of sci-fi trying to attempt realism:
--- Transit complete ---

--- Establish ISN ---

--- Protocols acknowledged ---

--- Restrict access. Security Level Two ----

--- Initiate upload. Analysis of Cylon ‘Worm’ ---

--- Upload complete ---

Colonel Anehachi began the meeting. The term ‘meeting’ was not entirely appropriate as very few of the participants were in the same rooms or even on the same ships. Indeed the ones that had just arrived were being shuttled to the various ships of Eighth Fleet. In truth, for most of the participants, only a small portion of their capacities were focused on the meeting. The rest were running simulations, analyzing shipboard data, reviewing internal security and dozens of other tasks.

“As you can see from the analysis the Cylon infiltration programs represent what I refer to as a very elegant brute force approach.”

“That is an interesting way of putting it Colonel,” a reply came over the main line of the meeting.

“Nonetheless I feel it appropriate,” Anehachi replied. “It took as several days to determine how the Cylons were able to find the means to infiltrate our computers. We know data was coming from the sensor but we were unable to determine the mechanism. It was reviewing the senor data from the Firebird that we found the answer.”

--- Initiate upload. File Qs84532Y ---

“Note the data, particularly the take from the passive arrays.”

“No pattern appears.”

--- Run simulation A3q – C43t ---

“As you can see as the system processes data from the passive arrays patterns do start to emerge,” Anehachi explained.

“But how?”

“Look at the raw data,” Anehachi ordered. “Isolate a single frequency and run a full analysis.”

--- Run pattern analysis ---

“There is code imbedded within the raw sensor data.”

“Exactly,” Anehachi said. “The Cylons are transmitting at low levels across virtually the entire spectrum. It looks initially like standard background radiation and jamming. But embedded within those transmissions are random lines of binary and algorithmic code. By themselves they are innocuous and will not trigger a response from our internal firewalls or filtering software. But you have seen what happens when our computers start to process the raw data being taken in from the sensors.”

“They are using our own data analysis systems against us,” came the reply. “As the data is analyzed and processed the code combines.”

“And because the code is random the combinations are random,” Anehachi picked up the thread. “But given enough time and enough raw code some do combine to form programs that search for more like code. And in doing so they begin to drag system resources and cause disruptions. Note the first system failures aboard the Firebird were with the sensors and targeting systems. And note that the first signs of damage within Eighth Fleet and at Trowley station were with those systems charged with analyzing the raw sensor data transmitted back from the Firebird. There is so much code that predicting what combinations are dangerous is impossible. And the nature of the attack means that live code will be active in our system as we analyze it.”

“So we set up a series of firewalls around the sensory analysis software,” another voice said. “Nothing gets passed to the rest of the system until it is cleared.”

--- Run simulation a32t-e89p ---

“You can see the problem with that approach,” Anehachi said. “Aside from our targeting sensors literally dozens of systems aboard our ships are set to receive information from the sensors. From life support to hyper control. Most that data is not time critical. But in the case of fire control even the most efficient firewalls will cause delays between .2 and .7 seconds in target locks and a full analysis will cause delays of up to three seconds. That does not adversely affect our ability to engage large relatively slow targets like Basestars. But it will seriously disrupt our ability to engage fighters or missiles.”

“So we have to be selective about how to use the filters.”

“That may not be enough,” Anehachi said. “The reason the attack seems so adaptive is because the creation of programs is random. The Cylons are literally generating millions of lines of code. You can see why I call it an ‘elegant brute force’ approach. The elegance comes because there is no way to predict what types of programs we will be dealing with. The brute force comes from the vast amounts of random code the Cylons are creating and transmitting near continuously.”

“The system resources they have committed must be enormous.”

“We are dealing with a machine race. I suspect they developed this form of attack specifically to deal with an encounter with Earth. They knew their systems would undoubtedly be incompatible with ours. So they created an attack that is not dependent on operating systems. All it requires to be effective is an enemy that uses extensive data analysis tools and networks their systems.”

“This lends credence to theory that they are sentient,” another voice noted. “This level of creativity is impressive. I doubt we could duplicate this type of attack.”

“The system requirements alone would shut down virtually all other systems. It would take the processing resources of an entire 2nd generation or above planetary system to generate that much raw randomized code.”

“How can their Basestars accomplish such a task?”

“We do not know,” Anehachi answered. “We have several competing theories.”

--- Initiate upload. File A34 – G12s ---

“Nothing conclusive. Anything else?”

“There mode of attack does provide us with the potential to launch a counterattack directly into their systems,” Colonel Anehachi said. “Review the log from the Firebird’s active sensor arrays. Particularly the starboard transmitters.”

“Interesting. This does provide us with an opportunity.”

“According to the Colonials it has been over forty years since the Cylons have been challenged on their own ground.”
It seems like quite interesting technobabble. Someone commented on it, and the author responded:
Review of chapter "Chapter Nineteen – Setting the Pieces in Place" from turol
Review:
More addictive than crack.

The 'worm' is total bullshit, but it's good bullshit, so I'm letting it pass.


Comments from author:
I will concede that I’m probably giving the Cylons an almost magic ability to get into computer systems. But I have a couple of defenses.

1 – They are code. In other words they can adapt to even unknown systems in a way no one else can. Some of this will be touched on in later chapters and will comprise a key part of the sequel.

2 – In my opinion the show is even more magical. Gaeta hooks up three standalone computers in the second episode of season two and suddenly the Cylons can infiltrate them. They were hardwire connections. Basically he took three desk top machines and hooked them up to make a LAN. Where was the external connection that allowed the Cylons access to the network? For that matter the Cylons were able to plant a virus in that network that affected systems all over the Galactica. How? The big deal about the Galactica is that NONE of its systems are connected. So the only systems that should have been affected by the Cylon virus were the three that were hooked up. And yet we saw power systems, communications and environmental controls go haywire.

And let’s not forget the specific point made in the Pilot movie that the airlocks on the Galactica were manual – not computer controlled. But in the show the environmental systems (not one of the computers plugged into Gaeta’s LAN) were able to AUTOMATICALLY close and seal the blast doors and AUTOMATICALLY depressurize the compartment.

Its pretty close to magic to be able to hack into a system that has no external links and affect systems that are designed to be operated manually with no automatic or computer controls. Think of it as the diagnostic computer in your car suddenly being able to turn the steering wheel and apply the parking brake.
Did that really happen on the show? The Cylons managing to hack onto a LAN? That's pretty bad.
User avatar
Uraniun235
Emperor's Hand
Posts: 13772
Joined: 2002-09-12 12:47am
Location: OREGON
Contact:

Post by Uraniun235 »

Yes, that really occurred.
User avatar
StarshipTitanic
Sith Marauder
Posts: 4475
Joined: 2002-07-03 09:41pm
Location: Massachusetts

Post by StarshipTitanic »

The fleet was full of Cylon infiltrators. It's plausable that a Cylon aboad the Galactica managed to set up a radio receiver somewhere.
"Man's unfailing capacity to believe what he prefers to be true rather than what the evidence shows to be likely and possible has always astounded me...God has not been proven not to exist, therefore he must exist." -- Academician Prokhor Zakharov

"Hal grabs life by the balls and doesn't let you do that [to] hal."

"I hereby declare myself master of the known world."
User avatar
Gil Hamilton
Tipsy Space Birdie
Posts: 12962
Joined: 2002-07-04 05:47pm
Contact:

Post by Gil Hamilton »

StarshipTitanic wrote:The fleet was full of Cylon infiltrators. It's plausable that a Cylon aboad the Galactica managed to set up a radio receiver somewhere.
I could never see how they could have done that and not have it immediately detected the moment they tried to broadcast with it. The Galactica herself and any ship with the Colonial Fleet are right next to the transmission source. Given interplanetary and intergalactic distances, the signal strength needed to be readable on such a scale would be a blaring klaxon directly next to it. In terms of relative strength I mean. You'd think they'd be able to go "We are recieving a radio signal from Galactica... and it's not coming from one of their broadcast rigs... and it's got an encryption that is squirrelly as frak... we'd better check that out."

Then again, this is also the series that has Cylon's transmitting massive amounts of information in the scant fractions of a second before destruction across interstellar distances without any power supply or broadcast rig at all, so I suppose it is just Magic Cylon Powers. Or one of the many things about Battlestar Galactica that they purposely side stepped around because it ruins the plot they want to do.
"Show me an angel and I will paint you one." - Gustav Courbet

"Quetzalcoatl, plumed serpent of the Aztecs... you are a pussy." - Stephen Colbert

"Really, I'm jealous of how much smarter than me he is. I'm not an expert on anything and he's an expert on things he knows nothing about." - Me, concerning a bullshitter
User avatar
StarshipTitanic
Sith Marauder
Posts: 4475
Joined: 2002-07-03 09:41pm
Location: Massachusetts

Post by StarshipTitanic »

Gil Hamilton wrote:I could never see how they could have done that and not have it immediately detected the moment they tried to broadcast with it.
Yeah, that's why I said "receiver" and not "transmitter." You should have mentioned the fact that fleet Cylons somehow sent D'Anna's documentary back to the Cylons in the Colonies. Even then, it's still a problem that can be worked around. They can send transmissions only when the fleet makes a jump. The Galactica is left alone for a few seconds before she follows the rest of the fleet, a perfect opportunity.
"Man's unfailing capacity to believe what he prefers to be true rather than what the evidence shows to be likely and possible has always astounded me...God has not been proven not to exist, therefore he must exist." -- Academician Prokhor Zakharov

"Hal grabs life by the balls and doesn't let you do that [to] hal."

"I hereby declare myself master of the known world."
User avatar
Gil Hamilton
Tipsy Space Birdie
Posts: 12962
Joined: 2002-07-04 05:47pm
Contact:

Post by Gil Hamilton »

StarshipTitanic wrote:Yeah, that's why I said "receiver" and not "transmitter." You should have mentioned the fact that fleet Cylons somehow sent D'Anna's documentary back to the Cylons in the Colonies. Even then, it's still a problem that can be worked around. They can send transmissions only when the fleet makes a jump. The Galactica is left alone for a few seconds before she follows the rest of the fleet, a perfect opportunity.
However, the Galactica is bound to have much more sensitive radio equipment than anything the Cylons could possibly carry on their person and install by themselves in secret.

Furthermore, any transmission they send from the Galactica, even if the Galactica is the last ship out, is bound to by picked up by the Galactica herself, since all their recievers are right at the point of origin.

Frankly, I'm not concerned about whether or not Cylons can secretly broadcast back without the Colonials knowing about it or even without transmitters. Obvious in the show they don't even need transmitters to send a high fidelity signal containing all the memories of a Cylon across interstellar distances. My issue is that it is damn goofy that they can without any discernable means to do so and without their signal being detected at all by anyone in the fleet.
"Show me an angel and I will paint you one." - Gustav Courbet

"Quetzalcoatl, plumed serpent of the Aztecs... you are a pussy." - Stephen Colbert

"Really, I'm jealous of how much smarter than me he is. I'm not an expert on anything and he's an expert on things he knows nothing about." - Me, concerning a bullshitter
User avatar
Xon
Sith Acolyte
Posts: 6206
Joined: 2002-07-16 06:12am
Location: Western Australia

Post by Xon »

Colonial fleet is unable to detect when something jumps, they only detect something jumping in when they get a radar signal off it.

Some type of miniture jump device which "jumps" a burst signal would be 100% stealthed as are as the Colonial are concerned. The Cylons are astronimically more advanced in FTL tech over the Colonial so this isnt a suprise.

And before anyone says anything; A jump device must transported photons and electrons, or there what comes out of a jump isnt solid matter anymore. So it is just a matter of scale and timing for a jump device to move EM signals.
"Okay, I'll have the truth with a side order of clarity." ~ Dr. Daniel Jackson.
"Reality has a well-known liberal bias." ~ Stephen Colbert
"One Drive, One Partition, the One True Path" ~ ars technica forums - warrens - on hhd partitioning schemes.
weemadando
SMAKIBBFB
Posts: 19195
Joined: 2002-07-28 12:30pm
Contact:

Post by weemadando »

Hell, even dumping a transmitter designed to wait a certain time (like 24 hours to ensure the fleet has moved on) before sending its signal is just as likely.
User avatar
phongn
Rebel Leader
Posts: 18487
Joined: 2002-07-03 11:11pm

Post by phongn »

Meh. You could dump raw machine code into a sensor package and it sure as hell shouldn't be executing any of it. And no firewall should be introducing latency on the order of three seconds!

Finally, what the heck kind of sensors are pumping out data that could possible contain executable data?
User avatar
Xon
Sith Acolyte
Posts: 6206
Joined: 2002-07-16 06:12am
Location: Western Australia

Post by Xon »

The Startrek bullshitium computer kind
"Okay, I'll have the truth with a side order of clarity." ~ Dr. Daniel Jackson.
"Reality has a well-known liberal bias." ~ Stephen Colbert
"One Drive, One Partition, the One True Path" ~ ars technica forums - warrens - on hhd partitioning schemes.
User avatar
phongn
Rebel Leader
Posts: 18487
Joined: 2002-07-03 11:11pm

Post by phongn »

Xon wrote:The Startrek bullshitium computer kind
Totally compromised Colonial computer technology is a better explanation, frankly - and while Galactica herself may have been built securely, who knows about her refits? Individual systems may have insecure code, but since they were never networked, they were never exposed.
User avatar
Gil Hamilton
Tipsy Space Birdie
Posts: 12962
Joined: 2002-07-04 05:47pm
Contact:

Post by Gil Hamilton »

phongn wrote:Totally compromised Colonial computer technology is a better explanation, frankly - and while Galactica herself may have been built securely, who knows about her refits? Individual systems may have insecure code, but since they were never networked, they were never exposed.
I'd imagine the Galactica herself was built in secret, but her various systems were built by government contractors on Caprica and then shipped in secret to the yard where Galactica was being laid down. Including her computer system and software containing all the insecure code.
"Show me an angel and I will paint you one." - Gustav Courbet

"Quetzalcoatl, plumed serpent of the Aztecs... you are a pussy." - Stephen Colbert

"Really, I'm jealous of how much smarter than me he is. I'm not an expert on anything and he's an expert on things he knows nothing about." - Me, concerning a bullshitter
User avatar
Durandal
Bile-Driven Hate Machine
Posts: 17927
Joined: 2002-07-03 06:26pm
Location: Silicon Valley, CA
Contact:

Post by Durandal »

The only plausible thing I see here is that Cylons can generate machine code that'll run on Colonial Fleet computers. Everything else is a load of bullshit. Why sensor packages would simply execute code fragments they happened to find in their spectrums is a complete mystery.
Damien Sorresso

"Ever see what them computa bitchez do to numbas? It ain't natural. Numbas ain't supposed to be code, they supposed to quantify shit."
- The Onion
User avatar
Arrow
Jedi Council Member
Posts: 2283
Joined: 2003-01-12 09:14pm

Post by Arrow »

Gil Hamilton wrote:
StarshipTitanic wrote:The fleet was full of Cylon infiltrators. It's plausable that a Cylon aboad the Galactica managed to set up a radio receiver somewhere.
I could never see how they could have done that and not have it immediately detected the moment they tried to broadcast with it. The Galactica herself and any ship with the Colonial Fleet are right next to the transmission source. Given interplanetary and intergalactic distances, the signal strength needed to be readable on such a scale would be a blaring klaxon directly next to it. In terms of relative strength I mean. You'd think they'd be able to go "We are recieving a radio signal from Galactica... and it's not coming from one of their broadcast rigs... and it's got an encryption that is squirrelly as frak... we'd better check that out."

Then again, this is also the series that has Cylon's transmitting massive amounts of information in the scant fractions of a second before destruction across interstellar distances without any power supply or broadcast rig at all, so I suppose it is just Magic Cylon Powers. Or one of the many things about Battlestar Galactica that they purposely side stepped around because it ruins the plot they want to do.
Actually, given the size of Galactica, it would very pausible to set up and hide a Cylon transceiver. First off, the Galactica's antennas are going to hull mounted, above the armor, for clear reception. The antennas are also going be directional, since you're not going to be transmitting through your armor and blasting your crew with RF, and you'll have the high gain characteristics of a directional antenna boosting your signal strength. The transceivers themselves could be IFMs, which are easy to blind with one signal, or a bank of channels of various bandwidths, set to cover certain frequency ranges, perhaps scanning through them.

Like wise, thermal and optical sensors will be hullmounted, and directional.

Civilian ships will likely have cheaper systems, covering far less spectrum.

So, all a Cylon agent would need to get a signal off Galactic is a narrow-beam directional antenna or a laser, knowledge of where Galactic's antennas/cameras are located (which they should have, given how they hacked Colonial systems) to avoid broadcasting directly in an antenna's backlobe, and knowledge of which frequencies aren't routinely covered by Colonial SIGINT (which they should also have). Then the Cylon would have to place the transmitter near the hull, preferrably in an area with thin hull plating, or in one the ship's few windows for a laser, and they can get a signal off, without the crew ever knowing.
Artillery. Its what's for dinner.
User avatar
Arrow
Jedi Council Member
Posts: 2283
Joined: 2003-01-12 09:14pm

Post by Arrow »

Durandal wrote:The only plausible thing I see here is that Cylons can generate machine code that'll run on Colonial Fleet computers. Everything else is a load of bullshit. Why sensor packages would simply execute code fragments they happened to find in their spectrums is a complete mystery.
For the same reason you can override a Star Trek ship's computer remotely - plot device.
Artillery. Its what's for dinner.
User avatar
phongn
Rebel Leader
Posts: 18487
Joined: 2002-07-03 11:11pm

Post by phongn »

Durandal wrote:The only plausible thing I see here is that Cylons can generate machine code that'll run on Colonial Fleet computers. Everything else is a load of bullshit. Why sensor packages would simply execute code fragments they happened to find in their spectrums is a complete mystery.
Obviously they are vulnerable to buffer overflow attacks.
User avatar
Xon
Sith Acolyte
Posts: 6206
Joined: 2002-07-16 06:12am
Location: Western Australia

Post by Xon »

phongn wrote:
Xon wrote:The Startrek bullshitium computer kind
Totally compromised Colonial computer technology is a better explanation, frankly - and while Galactica herself may have been built securely, who knows about her refits? Individual systems may have insecure code, but since they were never networked, they were never exposed.
I was talking about the story linked in the OP.
"Okay, I'll have the truth with a side order of clarity." ~ Dr. Daniel Jackson.
"Reality has a well-known liberal bias." ~ Stephen Colbert
"One Drive, One Partition, the One True Path" ~ ars technica forums - warrens - on hhd partitioning schemes.
User avatar
Battlehymn Republic
Jedi Council Member
Posts: 1828
Joined: 2004-10-27 01:34pm

Post by Battlehymn Republic »

The presence of Cylon infiltrators and insecure add-on systems (kind of tarnishing the image of the Galactica as super-secured) would explain why they're vulnerable now and then, but the author of the story did make some good points.
For that matter the Cylons were able to plant a virus in that network that affected systems all over the Galactica. How? The big deal about the Galactica is that NONE of its systems are connected. So the only systems that should have been affected by the Cylon virus were the three that were hooked up. And yet we saw power systems, communications and environmental controls go haywire.
The point about the airlocks being manual in the pilot movie but being able to be hacked during the show can be explained away by the writers forgetting that part from the pilot, I guess.

I suppose the best way is to just handwave it. I just wanted to know how plausible the technobabble was. For fan-written technobabble, it's good bullshit. Rather ingenious explanation, though ultimately impossible, I suppose.
User avatar
phongn
Rebel Leader
Posts: 18487
Joined: 2002-07-03 11:11pm

Post by phongn »

Xon wrote:I was talking about the story linked in the OP.
I know.
Battlehymn Republic wrote:I suppose the best way is to just handwave it. I just wanted to know how plausible the technobabble was. For fan-written technobabble, it's good bullshit. Rather ingenious explanation, though ultimately impossible, I suppose.
No, it's bad bullshit.
User avatar
Chris OFarrell
Durandal's Bitch
Posts: 5724
Joined: 2002-08-02 07:57pm
Contact:

Post by Chris OFarrell »

Meh, I think its more a case of Colonial computer systems having very bad programing scope limitations....and the Cylons exploting the crap out of it with custom designed software that gave them access to everything with the backdoor. But when the computers were all linked together in scattered' without any real protection (I call BS on Gaeta desinging and programing a REAL firewall in a couple of hours no problems), the Cylons were able to probably overrun the buffers and get into the systems, even WITHOUT the custom backdoor because they are still infinitly familiar with Colonial programing.

Then when Tigh broke the connections, the external 'user' was disconnected...but they had already reprogramed enough storage with their virus.
Image
User avatar
Spacebeard
Padawan Learner
Posts: 473
Joined: 2005-03-21 10:52pm
Location: MD, USA

Post by Spacebeard »

Chris OFarrell wrote:Meh, I think its more a case of Colonial computer systems having very bad programing scope limitations....
What do you mean by "programming scope limitations"?
(I call BS on Gaeta desinging and programing a REAL firewall in a couple of hours no problems)
Certainly we know that whatever Gaeta set up was not what we would call a "firewall". A firewall is simply a set of logical rules allowing only certain packets to pass: it is nonsensical to say that something "broke through" such a filter, and it would be useless to have multiple firewalls installed in series at the same point.

"Scattered", like most of nBSG's handling of computers, is an absolute mess, and I think the only way to maintain suspension of disbelief is to reason that certain words like "firewall" don't have exactly the same meaning that they do in our world. That isn't terribly far-fetched, considering that "firewall" no longer refers exclusively to coal furnaces. The concept of a battlestar's computers being "networked" or not is probably also far more complex than it sounds.
the Cylons were able to probably overrun the buffers and get into the systems, even WITHOUT the custom backdoor because they are still infinitly familiar with Colonial programing.
What makes you think that they didn't use a backdoor? Remember that the Colonials didn't realize the extent to which their systems had been compromised until the day of the attack, and the ragtag fleet certainly doesn't have either the time or the resources to rewrite their entire base of software from scratch. I very much doubt that this is anything like cleaning spyware off of some shitbox Windows PC: there is no "known good" software they can reinstall. They would have to rewrite everything from scratch, starting with a hand-written compiler. See the classic paper "Trusting Trust" that I linked to earlier.
"This war, all around us, is being fought over the very meanings of words." - Chad, Deus Ex
User avatar
Gil Hamilton
Tipsy Space Birdie
Posts: 12962
Joined: 2002-07-04 05:47pm
Contact:

Post by Gil Hamilton »

Arrow wrote:Actually, given the size of Galactica, it would very pausible to set up and hide a Cylon transceiver. First off, the Galactica's antennas are going to hull mounted, above the armor, for clear reception. The antennas are also going be directional, since you're not going to be transmitting through your armor and blasting your crew with RF, and you'll have the high gain characteristics of a directional antenna boosting your signal strength. The transceivers themselves could be IFMs, which are easy to blind with one signal, or a bank of channels of various bandwidths, set to cover certain frequency ranges, perhaps scanning through them.

Like wise, thermal and optical sensors will be hullmounted, and directional.

Civilian ships will likely have cheaper systems, covering far less spectrum.

So, all a Cylon agent would need to get a signal off Galactic is a narrow-beam directional antenna or a laser, knowledge of where Galactic's antennas/cameras are located (which they should have, given how they hacked Colonial systems) to avoid broadcasting directly in an antenna's backlobe, and knowledge of which frequencies aren't routinely covered by Colonial SIGINT (which they should also have). Then the Cylon would have to place the transmitter near the hull, preferrably in an area with thin hull plating, or in one the ship's few windows for a laser, and they can get a signal off, without the crew ever knowing.
And how, exactly, does a Cylon get outside the ship with the antenna and various equipment to mount it to the hull and run a power line to power it?

Furthermore, what happens when the ship isn't pointing in the right direction to broadcast? Besides, lasers are worthless for transporting over interstellar distances due to light lag and the fact that they'd have to be bloody powerful lasers. Besides, if they were within transmission range for conventional radio, then the Colonials have bigger problems than secret signals from within the fleet.
"Show me an angel and I will paint you one." - Gustav Courbet

"Quetzalcoatl, plumed serpent of the Aztecs... you are a pussy." - Stephen Colbert

"Really, I'm jealous of how much smarter than me he is. I'm not an expert on anything and he's an expert on things he knows nothing about." - Me, concerning a bullshitter
User avatar
Durandal
Bile-Driven Hate Machine
Posts: 17927
Joined: 2002-07-03 06:26pm
Location: Silicon Valley, CA
Contact:

Post by Durandal »

phongn wrote:
Durandal wrote:The only plausible thing I see here is that Cylons can generate machine code that'll run on Colonial Fleet computers. Everything else is a load of bullshit. Why sensor packages would simply execute code fragments they happened to find in their spectrums is a complete mystery.
Obviously they are vulnerable to buffer overflow attacks.
That doesn't wash either. In order to exploit a buffer overflow (and smash the stack), you have to insert the malicious code into the buffer all at once through taking advantage of a dumb copy operation. A sensor would be a device that would read a specific amount of data at discrete intervals since it's a sampler. By its very nature, it wouldn't just be blindly copying data with respect to the length.
Damien Sorresso

"Ever see what them computa bitchez do to numbas? It ain't natural. Numbas ain't supposed to be code, they supposed to quantify shit."
- The Onion
User avatar
phongn
Rebel Leader
Posts: 18487
Joined: 2002-07-03 11:11pm

Post by phongn »

Durandal wrote:That doesn't wash either. In order to exploit a buffer overflow (and smash the stack), you have to insert the malicious code into the buffer all at once through taking advantage of a dumb copy operation. A sensor would be a device that would read a specific amount of data at discrete intervals since it's a sampler. By its very nature, it wouldn't just be blindly copying data with respect to the length.
I was not really being serious with my comment.
User avatar
Durandal
Bile-Driven Hate Machine
Posts: 17927
Joined: 2002-07-03 06:26pm
Location: Silicon Valley, CA
Contact:

Post by Durandal »

Oh. :)
Damien Sorresso

"Ever see what them computa bitchez do to numbas? It ain't natural. Numbas ain't supposed to be code, they supposed to quantify shit."
- The Onion
Post Reply