Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Self-modifying code

From Wikipedia, the free encyclopedia
Source code that alters its instructions to the hardware while executing
icon
This articleneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Self-modifying code" – news ·newspapers ·books ·scholar ·JSTOR
(April 2009) (Learn how and when to remove this message)

Incomputer science,self-modifying code (SMC orSMoC) iscode that alters its owninstructions while it isexecuting – usually to reduce theinstruction path length and improveperformance or simply to reduce otherwiserepetitively similar code, thus simplifyingmaintenance. The term is usually only applied to code where the self-modification is intentional, not in situations where code accidentally modifies itself due to an error such as abuffer overflow.

Self-modifying code can involve overwriting existing instructions or generating new code at run time and transferring control to that code.

Self-modification can be used as an alternative to the method of "flag setting" and conditional program branching, used primarily to reduce the number of times a condition needs to be tested.

The method is frequently used for conditionally invokingtest/debugging code without requiring additionalcomputational overhead for everyinput/output cycle.

The modifications may be performed:

  • only during initialization – based on inputparameters (when the process is more commonly described as software 'configuration' and is somewhat analogous, in hardware terms, to settingjumpers forprinted circuit boards). Alteration of program entrypointers is an equivalent indirect method of self-modification, but requiring the co-existence of one or more alternative instruction paths, increasing theprogram size.
  • throughout execution ("on the fly") – based on particular program states that have been reached during the execution

In either case, the modifications may be performed directly to themachine code instructions themselves, byoverlaying new instructions over the existing ones (for example: altering a compare and branch to anunconditional branch or alternatively a 'NOP').

In theIBM System/360 architecture, and its successors up toz/Architecture, an EXECUTE (EX) instructionlogically overlays the second byte of its target instruction with the low-order 8 bits ofregister 1. This provides the effect of self-modification although the actual instruction in storage is not altered.

Application in low and high level languages

[edit]

Self-modification can be accomplished in a variety of ways depending upon the programming language and its support for pointers and/or access to dynamic compiler or interpreter 'engines':

  • overlay of existing instructions (or parts of instructions such as opcode, register, flags or addresses) or
  • direct creation of whole instructions or sequences of instructions in memory
  • creation or modification ofsource code statements followed by a 'mini compile' or a dynamic interpretation (seeeval statement)
  • creating an entire program dynamically and then executing it

Assembly language

[edit]

Self-modifying code is quite straightforward to implement when usingassembly language. Instructions can be dynamically created inmemory (or else overlaid over existing code in non-protected program storage),[1] in a sequence equivalent to the ones that a standard compiler may generate as theobject code. With modern processors, there can be unintendedside effects on theCPU cache that must be considered. The method was frequently used for testing 'first time' conditions, as in this suitably commentedIBM/360assembler example. It uses instruction overlay to reduce theinstruction path length by (N×1)−1 where N is the number of records on the file (−1 being theoverhead to perform the overlay).

SUBRTN NOP OPENED      FIRST TIME HERE?* The NOP is x'4700'<Address_of_opened>       OI    SUBRTN+1,X'F0'  YES, CHANGE NOP TO UNCONDITIONAL BRANCH (47F0...)       OPEN   INPUT               AND  OPEN THE INPUT FILE SINCE IT'S THE FIRST TIME THRUOPENED GET    INPUT        NORMAL PROCESSING RESUMES HERE      ...

Alternative code might involve testing a "flag" each time through. The unconditional branch is slightly faster than a compare instruction, as well as reducing the overall path length. In later operating systems for programs residing inprotected storage this technique could not be used and so changing the pointer to thesubroutine would be used instead. The pointer would reside indynamic storage and could be altered at will after the first pass to bypass the OPEN (having to load a pointer first instead of a direct branch & link to the subroutine would add N instructions to the path length – but there would be a corresponding reduction of N for the unconditional branch that would no longer be required).

Below is an example inZilog Z80 assembly language. The code increments register "B" in range [0,5]. The "CP" compare instruction is modified on each loop.

;==========ORG0HCALLFUNC00HALT;==========FUNC00:LDA,6LDHL,label01+1LDB,(HL)label00:INCBLD(HL),Blabel01:CP$0JPNZ,label00RET;==========

Self-modifying code is sometimes used to overcome limitations in a machine's instruction set. For example, in theIntel 8080 instruction set, one cannot input a byte from an input port that is specified in a register. The input port is statically encoded in the instruction itself, as the second byte of a two byte instruction. Using self-modifying code, it is possible to store a register's contents into the second byte of the instruction, then execute the modified instruction in order to achieve the desired effect.

High-level languages

[edit]

Some compiled languages explicitly permit self-modifying code. For example, the ALTER verb inCOBOL may be implemented as a branch instruction that is modified during execution.[2] Somebatch programming techniques involve the use of self-modifying code.Clipper andSPITBOL also provide facilities for explicit self-modification. The Algol compiler onB6700 systems offered an interface to the operating system whereby executing code could pass a text string or a named disc file to the Algol compiler and was then able to invoke the new version of a procedure.

With interpreted languages, the "machine code" is the source text and may be susceptible to editing on-the-fly: inSNOBOL the source statements being executed are elements of a text array. Other languages, such asPerl andPython, allow programs to create new code at run-time and execute it using aneval function, but do not allow existing code to be mutated. The illusion of modification (even though no machine code is really being overwritten) is achieved by modifying function pointers, as in this JavaScript example:

varf=function(x){returnx+1};// assign a new definition to f:f=newFunction('x','return x + 2');

Lisp macros also allow runtime code generation without parsing a string containing program code.

The Push programming language is agenetic programming system that is explicitly designed for creating self-modifying programs. While not a high level language, it is not as low level as assembly language.[3]

Compound modification

[edit]

Prior to the advent of multiple windows, command-line systems might offer a menu system involving the modification of a running command script. Suppose anMS-DOS batch file, MENU.BAT, contains the following:[4][nb 1]

   :start   SHOWMENU.EXE

Upon initiation of MENU.BAT from the command line, SHOWMENU presents an on-screen menu, with possible help information, example usages and so forth. Eventually the user makes a selection that requires a commandSOMENAME to be performed: SHOWMENU exits after rewriting the file MENU.BAT to contain

   :start   SHOWMENU.EXE   CALLSOMENAME.BAT   GOTO start

Because the command interpreter does not compile a script file and then execute it, nor does it read the entire file into memory before starting execution, nor yet rely on the content of a record buffer, when SHOWMENU exits, the command interpreter finds a new command to execute (it is to invoke the script fileSOMENAME, in a directory location and via a protocol known to SHOWMENU), and after that command completes, it goes back to the start of the script file and reactivates SHOWMENU ready for the next selection. Should the menu choice be to quit, the file would be rewritten back to its original state. Although this starting state has no use for the label, it, or an equivalent amount of text is required, because the command interpreter recalls the byte position of the next command when it is to start the next command, thus the re-written file must maintain alignment for the next command start point to indeed be the start of the next command.

Aside from the convenience of a menu system (and possible auxiliary features), this scheme means that the SHOWMENU.EXE system is not in memory when the selected command is activated, a significant advantage when memory is limited.[4][5]

Control tables

[edit]

Control tableinterpreters can be considered to be, in one sense, 'self-modified' by data values extracted from the table entries (rather than specificallyhand coded inconditional statements of the form "IF inputx = 'yyy'").

Channel programs

[edit]

Some IBMaccess methods traditionally used self-modifyingchannel programs, where a value, such as a disk address, is read into an area referenced by a channel program, where it is used by a later channel command to access the disk.

History

[edit]

TheIBM SSEC, demonstrated in January 1948, had the ability to modify its instructions or otherwise treat them exactly like data. However, the capability was rarely used in practice.[6] In the early days of computers, self-modifying code was often used to reduce use of limited memory, or improve performance, or both. It was also sometimes used to implement subroutine calls and returns when the instruction set only provided simple branching or skipping instructions to vary thecontrol flow.[7][8] This use is still relevant in certain ultra-RISC architectures, at least theoretically; see for exampleone-instruction set computer.Donald Knuth'sMIX architecture also used self-modifying code to implement subroutine calls.[9]

Usage

[edit]

Self-modifying code can be used for various purposes:

  • Semi-automaticoptimizing of a state-dependent loop.
  • Dynamic in-place code optimization for speed depending on load environment.[10][11][nb 2]
  • Run-time code generation, or specialization of an algorithm in runtime or loadtime (which is popular, for example, in the domain of real-time graphics) such as a general sort utility – preparing code to perform the key comparison described in a specific invocation.
  • Altering ofinlined state of anobject, or simulating the high-level construction ofclosures.
  • Patching ofsubroutine (pointer) address calling, usually as performed at load/initialization time ofdynamic libraries, or else on each invocation, patching the subroutine's internal references to its parameters so as to use their actual addresses (i.e. indirect self-modification).
  • Evolutionary computing systems such asneuroevolution,genetic programming and otherevolutionary algorithms.
  • Hiding of code to preventreverse engineering (by use of adisassembler ordebugger) or to evade detection by virus/spyware scanning software and the like.
  • Filling 100% of memory (in some architectures) with a rolling pattern of repeatingopcodes, to erase all programs and data, or toburn-in hardware or performRAM tests.[12]
  • Compressing code to be decompressed and executed at runtime, e.g., when memory or disk space is limited.[10][11]
  • Some very limitedinstruction sets leave no option but to use self-modifying code to perform certain functions. For example, aone-instruction set computer (OISC) machine that uses only the subtract-and-branch-if-negative "instruction" cannot do an indirect copy (something like the equivalent of "*a = **b" in theC language) without using self-modifying code.
  • Booting. Earlymicrocomputers often used self-modifying code in their bootloaders. Since the bootloader was keyed in via the front panel at every power-on, it did not matter if thebootloader modified itself. However, even today many bootstrap loaders areself-relocating, and a few are even self-modifying.[nb 3]
  • Altering instructions for fault-tolerance.[13]

Optimizing a state-dependent loop

[edit]

Pseudocode example:

repeatN times {    if STATE is 1        increase A by one    else        decrease A by one    do something with A}

Self-modifying code, in this case, would simply be a matter of rewriting the loop like this:

repeatN times {increase A by one    do something with A    when STATE has to switch {        replace the opcode "increase" above with the opcode to decrease, or vice versa    }}

Note that two-state replacement of theopcode can be easily written as 'xor var at address with the value "opcodeOf(Inc) xor opcodeOf(dec)"'.

Choosing this solution must depend on the value ofN and the frequency of state changing.

Specialization

[edit]

Suppose a set of statistics such as average, extrema, location of extrema, standard deviation, etc. are to be calculated for some large data set. In a general situation, there may be an option of associating weights with the data, so each xi is associated with a wi and rather than test for the presence of weights at every index value, there could be two versions of the calculation, one for use with weights and one not, with one test at the start. Now consider a further option, that each value may have associated with it a Boolean to signify whether that value is to be skipped or not. This could be handled by producing four batches of code, one for each permutation and code bloat results. Alternatively, the weight and the skip arrays could be merged into a temporary array (with zero weights for values to be skipped), at the cost of processing and still there is bloat. However, with code modification, to the template for calculating the statistics could be added as appropriate the code for skipping unwanted values, and for applying weights. There would be no repeated testing of the options and the data array would be accessed once, as also would the weight and skip arrays, if involved.

Use as camouflage

[edit]

Self-modifying code is more complex to analyze than standard code and can therefore be used as a protection againstreverse engineering andsoftware cracking. Self-modifying code was used to hide copy protection instructions in 1980s disk-based programs for systems such asIBM PC compatibles andApple II. For example, on an IBM PC, thefloppy disk drive access instructionint 0x13 would not appear in the executable program's image but it would be written into the executable's memory image after the program started executing.

Self-modifying code is also sometimes used by programs that do not want to reveal their presence, such ascomputer viruses and someshellcodes. Viruses and shellcodes that use self-modifying code mostly do this in combination withpolymorphic code. Modifying a piece of running code is also used in certain attacks, such asbuffer overflows.

Self-referential machine learning systems

[edit]

Traditionalmachine learning systems have a fixed, pre-programmed learningalgorithm to adjust theirparameters. However, since the 1980sJürgen Schmidhuber has published several self-modifying systems with the ability to change their own learning algorithm. They avoid the danger of catastrophic self-rewrites by making sure that self-modifications will survive only if they are useful according to a user-givenfitness,error orreward function.[14]

Operating systems

[edit]

TheLinux kernel notably makes wide use of self-modifying code; it does so to be able to distribute a single binary image for each major architecture (e.g.IA-32,x86-64, 32-bitARM,ARM64...) while adapting the kernel code in memory during boot depending on the specific CPU model detected, e.g. to be able to take advantage of new CPU instructions or to work around hardware bugs.[15][16] To a lesser extent, theDR-DOS kernel also optimizes speed-critical sections of itself at loadtime depending on the underlying processor generation.[10][11][nb 2]

Regardless, at ameta-level, programs can still modify their own behavior by changing data stored elsewhere (seemetaprogramming) or via use ofpolymorphism.

Massalin's Synthesis kernel

[edit]

The Synthesiskernel presented inAlexia Massalin'sPh.D. thesis[17][18] is a tinyUnix kernel that takes astructured, or evenobject oriented, approach to self-modifying code, where code is created for individualquajects, like filehandles. Generating code for specific tasks allows the Synthesis kernel to (as a JIT interpreter might) apply a number ofoptimizations such asconstant folding orcommon subexpression elimination.

The Synthesis kernel was very fast, but was written entirely in assembly. The resulting lack of portability has prevented Massalin's optimization ideas from being adopted by any production kernel. However, the structure of the techniques suggests that they could be captured by a higher levellanguage, albeit one more complex than existing mid-level languages. Such a language and compiler could allow development of faster operating systems and applications.

Paul Haeberli and Bruce Karsh have objected to the "marginalization" of self-modifying code, and optimization in general, in favor of reduced development costs.[19]

Interaction of cache and self-modifying code

[edit]

On architectures without coupled data and instruction cache (for example, someSPARC, ARM, andMIPS cores) the cache synchronization must be explicitly performed by the modifying code (flush data cache and invalidate instruction cache for the modified memory area).

In some cases short sections of self-modifying code execute more slowly on modern processors. This is because a modern processor will usually try to keep blocks of code in its cache memory. Each time the program rewrites a part of itself, the rewritten part must be loaded into the cache again, which results in a slight delay, if the modifiedcodelet shares the same cache line with the modifying code, as is the case when the modified memory address is located within a few bytes to the one of the modifying code.

The cache invalidation issue on modern processors usually means that self-modifying code would still be faster only when the modification will occur rarely, such as in the case of a state switching inside an inner loop.[citation needed]

Most modern processors load the machine code before they execute it, which means that if an instruction that is too near theinstruction pointer is modified, the processor will not notice, but instead execute the code as it wasbefore it was modified. Seeprefetch input queue (PIQ). PC processors must handle self-modifying code correctly for backwards compatibility reasons but they are far from efficient at doing so.[citation needed]

Security issues

[edit]

Because of the security implications of self-modifying code, all of the majoroperating systems are careful to remove such vulnerabilities as they become known. The concern is typically not that programs will intentionally modify themselves, but that they could be maliciously changed by anexploit.

One mechanism for preventing malicious code modification is an operating system feature calledW^X (for "writexor execute"). This mechanism prohibits a program from making any page of memory both writable and executable. Some systems prevent a writable page from ever being changed to be executable, even if write permission is removed.[citation needed] Other systems provide a 'back door' of sorts, allowing multiple mappings of a page of memory to have different permissions. A relatively portable way to bypass W^X is to create a file with all permissions, then map the file into memory twice. On Linux, one may use an undocumented SysV shared memory flag to get executable shared memory without needing to create a file.[citation needed]

Advantages

[edit]

Disadvantages

[edit]

Self-modifying code is harder to read and maintain because the instructions in the source program listing are not necessarily the instructions that will be executed. Self-modification that consists of substitution offunction pointers might not be as cryptic, if it is clear that the names of functions to be called are placeholders for functions to be identified later.

Self-modifying code can be rewritten as code that tests aflag and branches to alternative sequences based on the outcome of the test, but self-modifying code typically runs faster.

Self-modifying code conflicts with authentication of the code and may require exceptions to policies requiring that all code running on a system be signed.

Modified code must be stored separately from its original form, conflicting with memory management solutions that normally discard the code in RAM and reload it from the executable file as needed.

On modern processors with aninstruction pipeline, code that modifies itself frequently may run more slowly, if it modifies instructions that the processor has already read from memory into the pipeline. On some such processors, the only way to ensure that the modified instructions are executed correctly is to flush the pipeline and reread many instructions.

Self-modifying code cannot be used at all in some environments, such as the following:

  • Application software running under an operating system with strict W^X security cannot execute instructions in pages it is allowed to write to—only the operating system is allowed to both write instructions to memory and later execute those instructions.
  • ManyHarvard architecturemicrocontrollers cannot execute instructions in read-write memory, but only instructions in memory that it cannot write to, ROM or non-self-programmableflash memory.
  • A multithreaded application may have several threads executing the same section of self-modifying code, possibly resulting in computation errors and application failures.

See also

[edit]

Notes

[edit]
  1. ^Later versions of DOS (since version 6.0) introduced the externalCHOICE command (inDR-DOS also the internal command andCONFIG.SYS directiveSWITCH), so, for this specific example application of a menu system, it was no longer necessary to refer to self-modifying batchjobs, however for other applications it continued to be a viable solution.
  2. ^abFor example, when running on386 or higher processors, laterNovell DOS 7 updates as well asDR-DOS 7.02 and higher will dynamically replace some default sequences of 16-bitREP MOVSW ("copy words") instructions in the kernel's runtime image by 32-bitREP MOVSD ("copy double-words") instructions when copying data from one memory location to another (and half the count of necessary repetitions) in order to speed up disk data transfers.Edge cases such as odd counts are taken care of.[10][11]
  3. ^As an example, theDR-DOSMBRs andboot sectors (which also hold thepartition table andBIOS Parameter Block, leaving less than 446 respectively 423 bytes for the code) were traditionally able to locate the boot file in theFAT12 orFAT16 file system by themselves and load it into memory as a whole, in contrast to theirMS-DOS/PC DOS counterparts, which instead relied on the system files to occupy the first two directory entries in the file system and the first three sectors ofIBMBIO.COM to be stored at the start of the data area in contiguous sectors containing a secondary loader to load the remainder of the file into memory (requiringSYS to take care of all these conditions). WhenFAT32 andLBA support was added,Microsoft even switched to require386 instructions and split the boot code over two sectors for size reasons, which was not an option for DR-DOS as it would have brokenbackward- and cross-compatibility with other operating systems inmulti-boot andchain load scenarios, as well as with olderPCs. Instead, theDR-DOS 7.07 boot sectors resorted to self-modifying code,opcode-level programming inmachine language, controlled utilization of (documented)side effects, multi-level data/codeoverlapping and algorithmicfolding techniques to still fit everything into a physical sector of only 512 bytes without giving up any of their extended functionality.

References

[edit]
  1. ^"HP 9100A/B".MoHPC - The Museum of HP Calculators. 1998. Overlapped Data and Program Memory / Self-Modifying Code.Archived from the original on 2023-09-23. Retrieved2023-09-23.
  2. ^"The ALTER Statement".COBOL Language Reference.Micro Focus.
  3. ^Spector, Lee."Evolutionary Computing with Push: Push, PushGP, and Pushpop". Retrieved2023-04-25.
  4. ^abFosdal, Lars (2001)."Self-modifying Batch File". Archived fromthe original on 2008-04-21.
  5. ^Paul, Matthias R. (1996-10-13) [1996-08-21, 1994].Konzepte zur Unterstützung administrativer Aufgaben in PC-Netzen und deren Realisierung für eine konkrete Novell-LAN-Umgebung unter Benutzung der Batchsprache von DOS. 3.11 (in German). Aachen, Germany: Lehrstuhl für Kommunikationsnetze (ComNets) &Institut für Kunststoffverarbeitung (IKV), RWTH. pp. 51,71–72. (110+3 pages, diskette) (NB. Design and implementation of a centrally controlled modular distributed management system for automaticclient configuration andsoftware deployment withself-healing update mechanism inLAN environments based onself-replicating and indirectly self-modifying batchjobs with zero memory footprint instead of a need forresident management software on the clients.)
  6. ^Bashe, Charles J.;Buchholz, Werner; Hawkins, George V.; Ingram, J. James; Rochester, Nathaniel (September 1981)."The Architecture of IBM's Early Computers"(PDF).IBM Journal of Research and Development.25 (5):363–376.CiteSeerX 10.1.1.93.8952.doi:10.1147/rd.255.0363.ISSN 0018-8646. Retrieved2023-04-25. p. 365:The SSEC was the first operating computer capable of treating its own stored instructions exactly like data, modifying them, and acting on the result.
  7. ^Miller, Barton P. (2006-10-30)."Binary Code Patching: An Ancient Art Refined for the 21st Century". Triangle Computer Science Distinguished Lecturer Series - Seminars 2006–2007.NC State University, Computer Science Department. Retrieved2023-04-25.
  8. ^Wenzl, Matthias; Merzdovnik, Georg; Ullrich, Johanna; Weippl, Edgar R. (June 2019) [February 2019, November 2018, May 2018]."From hack to elaborate technique - A survey on binary rewriting"(PDF).ACM Computing Surveys.52 (3). Vienna, Austria: 49:1–49:36 [49:1].doi:10.1145/3316415.S2CID 195357367. Article 49.Archived(PDF) from the original on 2021-01-15. Retrieved2021-11-28. p. 49:1:[…] Originally,binary rewriting was motivated by the need to change parts of a program during execution (e.g., run-time patching on thePDP-1 in the 1960's) […] (36 pages)
  9. ^Knuth, Donald Ervin (2009) [1997]."MMIX 2009 - a RISC computer for the third millennium".Archived from the original on 2021-11-27. Retrieved2021-11-28.
  10. ^abcd"Caldera OpenDOS Machine Readable Source Kit (M.R.S) 7.01".Caldera, Inc. 1997-05-01. Archived fromthe original on 2021-08-07. Retrieved2022-01-02.[1]
  11. ^abcdPaul, Matthias R. (1997-10-02)."Caldera OpenDOS 7.01/7.02 Update Alpha 3 IBMBIO.COM README.TXT". Archived fromthe original on 2003-10-04. Retrieved2009-03-29.[2]
  12. ^Wilkinson, William "Bill" Albert (2003) [1996, 1984]."The H89 Worm: Memory Testing the H89".Bill Wilkinson's Heath Company Page.Archived from the original on 2021-12-13. Retrieved2021-12-13.[…] Besides fetching an instruction, theZ80 uses half of the cycle torefresh thedynamic RAM. […] since the Z80 must spend half of eachinstruction fetch cycle performing other chores, it doesn't have as much time to fetch aninstruction byte as it does a data byte. If one of theRAM chips at the memory location being accessed is a little slow, the Z80 may get the wrong bit pattern when it fetches an instruction, but get the right one when it reads data. […] the built-in memory test won't catch this type of problem […] it's strictly a data read/write test. During the test, all instruction fetches are from theROM, not from RAM […] result[ing] in theH89 passing the memory test but still operating erratically on some programs. […] This is a program that tests memory by relocating itself through RAM. As it does so, the CPU prints the current address of the program on theCRT and then fetches the instruction at that address. If the RAM ICs are okay at that address, the CPU relocates the test program to the next memory location, prints the new address, and repeats the procedure. But, if one of the RAM ICs is slow enough to return an incorrect bit pattern, the CPU will misinterpret the instruction and behave unpredictably. However, it's likely that the display will lock up showing the address of faulty IC. This narrows the problem down eight ICs, which is an improvement over having to check as much as 32. […] The […] program will perform a worm test by pushing an RST 7 (RESTART 7) instruction from the low end of memory on up to the last working address. The rest of the program remains stationary and handles the display of the current location of the RST 7 command and itsrelocation. Incidentally, the program is called aworm test because, as the RST 7 instruction moves up through memory, it leaves behind aslime trail ofNOPs (NO OPERATION). […]
  13. ^Ortiz, Carlos Enrique (2015-08-29) [2007-08-18]."On Self-Modifying Code and the Space Shuttle OS". Retrieved2023-04-25.
  14. ^Jürgen Schmidhuber's publications onself-modifying code for self-referential machine learning systems
  15. ^Paltsev, Evgeniy (2020-01-30)."Self Modifying Code in Linux Kernel - What, Where and How". Retrieved2022-11-27.
  16. ^Wieczorkiewicz, Pawel."Linux Kernel Alternatives". Retrieved2022-11-27.
  17. ^Pu, Calton;Massalin, Henry; Ioannidis, John (1992).Synthesis: An Efficient Implementation of Fundamental Operating System Services(PDF) (PhD thesis). New York, USA: Department of Computer Sciences,Columbia University. UMI Order No. GAX92-32050. Retrieved2023-04-25.[3]
  18. ^Henson, Valerie (2008-02-20)."KHB: Synthesis: An Efficient Implementation of Fundamental Operating Systems Services".LWN.net.Archived from the original on 2021-08-17. Retrieved2022-05-19.
  19. ^Haeberli, Paul; Karsh, Bruce (1994-02-03)."Io Noi Boccioni - Background on Futurist Programming".Grafica Obscura. Retrieved2023-04-25.

Further reading

[edit]

External links

[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=Self-modifying_code&oldid=1317136834"
Category:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp