Probabilistic contracts for component-based design
ATVA'10 Proceedings of the 8th international conference on Automated technology for verification and analysis
Causality analysis in contract violation
RV'10 Proceedings of the First international conference on Runtime verification
Vision paper: make a difference! (semantically)
Proceedings of the 14th international conference on Model driven engineering languages and systems
Moving from specifications to contracts in component-based design
FASE'12 Proceedings of the 15th international conference on Fundamental Approaches to Software Engineering
A Modal Interface Theory for Component-based Design
Fundamenta Informaticae - Application of Concurrency to System Design, the Eighth Special Issue
Probabilistic contracts for component-based design
Formal Methods in System Design
A modal specification theory for components with data
Science of Computer Programming
Hi-index | 0.00 |
In order to increase their stealth, malware commonly use the self-modification property of programs. By doing so, programs can hide their real code so that it is difficult to define a signature for it. But then, what is the meaning of those programs: the obfuscated form, or the hidden one? Furthermore, from a computability perspective, it becomes hard to speak about the program since, its own code varies over time. To cope with these issues, we provide an operational semantics for self-modifying programs and we show that they can be constructively rewritten to a non-modifying program.