Skip to Main content Skip to Navigation
Conference papers

A computability perspective on self-modifying programs

Guillaume Bonfante 1 Jean-Yves Marion 1 Daniel Reynaud 1
1 CARTE - Theoretical adverse computations, and safety
LORIA - FM - Department of Formal Methods , Inria Nancy - Grand Est
Abstract : In order to increase their stealth, malware com- monly use the self-modification property of programs. By doing so, programs can hide their real code so that it is difficult to define a signature for it. But then, what is the meaning of those programs: the obfuscated form, or the hidden one? Furthermore, from a computability perspective, it becomes hard to speak about the program since, its own code varies over time. To cope with these issues, we provide an operational semantics for self-modifying programs and we show that they can be constructively rewritten to a non-modifying program.
Document type :
Conference papers
Complete list of metadata

Cited literature [9 references]  Display  Hide  Download
Contributor : Guillaume Bonfante Connect in order to contact the contributor
Submitted on : Thursday, November 19, 2009 - 2:39:28 PM
Last modification on : Saturday, October 16, 2021 - 11:26:05 AM
Long-term archiving on: : Tuesday, October 16, 2012 - 2:25:55 PM


Files produced by the author(s)


  • HAL Id : inria-00433472, version 1



Guillaume Bonfante, Jean-Yves Marion, Daniel Reynaud. A computability perspective on self-modifying programs. 7th IEEE International Conference on Software Engineering and Formal Methods - SEFM 2009, Nov 2009, Hanoi, Vietnam. ⟨inria-00433472⟩



Record views


Files downloads