A computability perspective on self-modifying programs

Guillaume Bonfante 1 Jean-Yves Marion 1 Daniel Reynaud 1
1 CARTE - Theoretical adverse computations, and safety
Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : In order to increase their stealth, malware com- monly use the self-modification property of programs. By doing so, programs can hide their real code so that it is difficult to define a signature for it. But then, what is the meaning of those programs: the obfuscated form, or the hidden one? Furthermore, from a computability perspective, it becomes hard to speak about the program since, its own code varies over time. To cope with these issues, we provide an operational semantics for self-modifying programs and we show that they can be constructively rewritten to a non-modifying program.
Type de document :
Communication dans un congrès
7th IEEE International Conference on Software Engineering and Formal Methods - SEFM 2009, Nov 2009, Hanoi, Vietnam. 2009
Liste complète des métadonnées

Littérature citée [9 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/inria-00433472
Contributeur : Guillaume Bonfante <>
Soumis le : jeudi 19 novembre 2009 - 14:39:28
Dernière modification le : jeudi 11 janvier 2018 - 06:21:25
Document(s) archivé(s) le : mardi 16 octobre 2012 - 14:25:55

Fichier

automodificateur.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

  • HAL Id : inria-00433472, version 1

Collections

Citation

Guillaume Bonfante, Jean-Yves Marion, Daniel Reynaud. A computability perspective on self-modifying programs. 7th IEEE International Conference on Software Engineering and Formal Methods - SEFM 2009, Nov 2009, Hanoi, Vietnam. 2009. 〈inria-00433472〉

Partager

Métriques

Consultations de la notice

319

Téléchargements de fichiers

291