Abstract-In order to increase their stealth, malware commonly use the self-modification property of programs. By doing so, programs can hide their real code so that it is difficult to define a signature for it. But then, what is the meaning of those programs: the obfuscated form, or the hidden one? Furthermore, from a computability perspective, it becomes hard to speak about the program since, its own code varies over time. To cope with these issues, we provide an operational semantics for self-modifying programs and we show that they can be constructively rewritten to a non-modifying program
Self-modifying programs run in a very specific way: they are capable to rewrite their own code at ru...
International audienceSelf modifying code is code that can modify its own instructions during the ex...
International audienceSelf-replication is one of the fundamental aspects of computing where a progra...
International audienceIn order to increase their stealth, malware com- monly use the self-modificati...
Self-modifying code is frequently used as an additional layer of complexity when obfuscating code. A...
With the extreme amount of data and software available on networks, the protection of online informa...
We describe a new framework for self-modifying programs, that is programs which can execute what the...
COMPAC 2003 : 27th Annual International Computer Software and Applications Conference, 3-6 Nov. 2003...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Although self-modifying code has been shyed away from due to its complexity and discouragement due t...
n recent years, code obfuscation has attracted both researchers and software developers as a useful ...
In this extended abstract we survey the most recent developments in code obfuscation and protection ...
Les programmes auto-modifiants fonctionnent de manière singulière car ils sont capables de réécrire ...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
Self-modifying programs run in a very specific way: they are capable to rewrite their own code at ru...
International audienceSelf modifying code is code that can modify its own instructions during the ex...
International audienceSelf-replication is one of the fundamental aspects of computing where a progra...
International audienceIn order to increase their stealth, malware com- monly use the self-modificati...
Self-modifying code is frequently used as an additional layer of complexity when obfuscating code. A...
With the extreme amount of data and software available on networks, the protection of online informa...
We describe a new framework for self-modifying programs, that is programs which can execute what the...
COMPAC 2003 : 27th Annual International Computer Software and Applications Conference, 3-6 Nov. 2003...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Although self-modifying code has been shyed away from due to its complexity and discouragement due t...
n recent years, code obfuscation has attracted both researchers and software developers as a useful ...
In this extended abstract we survey the most recent developments in code obfuscation and protection ...
Les programmes auto-modifiants fonctionnent de manière singulière car ils sont capables de réécrire ...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
Self-modifying programs run in a very specific way: they are capable to rewrite their own code at ru...
International audienceSelf modifying code is code that can modify its own instructions during the ex...
International audienceSelf-replication is one of the fundamental aspects of computing where a progra...