Show HN: Compile C to Not Gates
145 points
5 months ago
| 18 comments
| github.com
| HN
Hi! I've been working on the flipjump project, a programming language with 1 opcode: flip (invert) a bit, then jump (unconditionally). So a bit-flip followed by more bit-flips. It's effectively a bunch of NOT gates. This language, as poor as it sounds, is RICH.

Today I completed my compiler from C to FlipJump. It takes C files, and compiles them into flipjump. I finished testing it all today, and it works! My key interest in this project is to stretch what we know of computing and to prove that anything can be done even with minimal power.

I appreciate you reading my announcement, and be happy to answer questions.

More links:

- The flipjump language: https://github.com/tomhea/flip-jump https://esolangs.org/wiki/FlipJump

- c2fj python package https://pypi.org/project/c2fj/

bangaladore
5 months ago
[-]
Reminds me of movfuscator [1]. This can compile programs to movs and only movs.

[1] https://github.com/Battelle/movfuscator

reply
LPisGood
5 months ago
[-]
Battelle is great. They also created some software called Cantor Dust [1] that turns files into images to allow humans to easily spot obfuscated data or files.

The sad thing about this kind of work, because I love it, is that to get paid to do it you need clearances and polygraphs and periodic reinvestigations/continuous monitoring and all sorts of things that I find unpleasant.

[1] https://github.com/Battelle/cantordust

reply
mmastrac
5 months ago
[-]
I'm not sure what you mean but I was a security researcher for a large company for a bit and required none of that. I was required to work airgapped at home, however.
reply
LPisGood
5 months ago
[-]
Really? You were doing offensive security work not for a government (/contractor)? What sorts companies, aside from some enterprise pen testers, employ these roles?
reply
saagarjha
5 months ago
[-]
The tools you’re talking about are not exclusive to offensive security. They’re plenty useful for malware analysis and other reverse engineering tasks.
reply
mmastrac
5 months ago
[-]
Email is in my profile -- happy to clarify/share some very rough details if you'd like.
reply
beng-nl
5 months ago
[-]
Agreed that is a fine piece of work. But the author is Chris Domas. Which is plain from the repo readme, but it’d be clearer to link to his repo.
reply
bangaladore
5 months ago
[-]
I was originally going to link their repo [1]. But I saw it was forked from the one I linked so I just gave that one instead.

[1] https://github.com/xoreaxeaxeax/movfuscator

reply
saagarjha
5 months ago
[-]
Chris used to (maybe still does?) work at Batelle.
reply
thegeekpirate
5 months ago
[-]
He went MIA after joining Intel, so I'm assuming he's still there.
reply
tromp
5 months ago
[-]
Am I right in deducing that this language gets its power from self-modifying code? I.e. flipping bits within addresses of the opcodes of the running program?
reply
tomhee
5 months ago
[-]
You are indeed right
reply
tromp
5 months ago
[-]
I would have expected the language documentation to focus more on this observation and to explain for instance how self modification is used to implement while loops. But I don't even see the term mentioned anywhere?!
reply
tomhee
5 months ago
[-]
Good point! It's mentioned in the github wiki here: https://github.com/tomhea/flip-jump/wiki/Learn-FlipJump#memo...

It was once in the Readme but as I kept developing it more it become longer and longer, so I moved it into the wiki, and especially to here: https://esolangs.org/wiki/FlipJump

reply
int_19h
5 months ago
[-]
This was actually a not uncommon approach to implementing loops in earliest mainfraims.
reply
tomhee
5 months ago
[-]
Do you have any article that I can read about it? Sounds interesting!
reply
tomhee
5 months ago
[-]
There is also a brainfuck to flipjump compiler: https://github.com/tomhea/bf2fj
reply
david-gpu
5 months ago
[-]
Ah, the convenience of brainfuck with the performance of flipjump. Excellent.
reply
tomhee
5 months ago
[-]
By the way, as a challenge, try how you can program an "If" statement in Flipjump.
reply
greenbit
5 months ago
[-]
I wondered this as well.

Thinking about it, if all you have is "invert some (N>1?) bits somewhere and jump to somewhere" .. I could see maybe it might work if you use self modifying code and there's really a 2nd instruction that is a no-op? Seems like it might work more like a cellular automata?

Of course, one could just go look at the documentation, but where's the fun in that?

reply
int_19h
5 months ago
[-]
You don't need a no-op; you can always just flip a bit you don't care about (e.g. reserve a word just for that) and then jump to next instruction.
reply
alok-g
5 months ago
[-]
Would like to know the answer. Thx.
reply
tomhee
5 months ago
[-]
reply
alok-g
5 months ago
[-]
To the best I now understand, the jump address is allowed to be an expression using a specified bit variable. That would mean that the language has means to compile an expression for evaluation at the run time. If I am understanding correctly, then the power of flip jump is coming from those expressions, not the base flipjump instruction itself.

If I haven't understood this right, then I still do not follow how if statement works with flipjump.

reply
tomhee
5 months ago
[-]
@alok-g I'll be happy to explain - You don't understand it correctly. The flipjump assembly syntax does allow relating to an address with offsets/more advanced stuff, but that doesn't add anything to.the language. It' just adds comfort to the programmer - it's basically like adding labels to an assembly language - it's possible to write assembly without them, just much less convenient.

The power of flipjump results in self modifying code. If I jump to a address that have the [flip 0, jump 0x1000], then I'll get to 0x1000 afterwards, right? But if I flip some specific bit in this instruction before jumping to it, it will become [flip 0, jump 0x1080]. You can call this instruction "memory bit", and the part of jumping to it and resulting in one of two possible addresses 0x1000/0x1040 based on a specific bit in it - "read the memory bit". The action is reading as you get to different place based on the value stored in this instruction. This "read" can also be seen as an "if". How you write then? For example writing "1" whould be doing a "read", and in the "read 0" case - do a flip to this address, and in the "read 1" case don't flip this memory address bit.

reply
alok-g
5 months ago
[-]
I could follow the part you have explained. Thanks still though.

>> But if I flip some specific bit in this instruction before jumping to it

Isn't the 'if' really happening in the above phrase? The rest of it is a modified jump address based on the above 'if' and just jumps to the modified address.

Now if I understand this correctly, how to do the above 'if', i.e., flip the address bit or not based on some condition?

May be it would begin from some bit read from IO which modifies an address. I saw that memory-mapped IO is used.

reply
pizza
5 months ago
[-]
Ah interesting.. wonder if you can model this with a recursively expanded algebraic expression. I've been thinking lately along similar lines about polynomials that encode pushdown automata, so this is cool to see.
reply
tomhee
5 months ago
[-]
If you have an answer I'd be happy to hear it!
reply
Firehawke
5 months ago
[-]
Wouldn't it be better to call it "compile C to Linux or BSD"?

I kid, I kid.

reply
dingdingdang
5 months ago
[-]
It always amazes me that this is possible (to some extend anyway, I mean, the base layer is binary so obviously simpler higher-end CPU instructions are possible!)

Is there any potential performance win in this? What I mean is; since this general direction could, in principle if not in practise, enable the targeting of say, the 5-10 most efficient CPU instructions rather than attempting to use the whole surface area... would this potentially be a win?

reply
eimrine
5 months ago
[-]
I was expecting to see a way to translate hello_world.c into an electronic schematic full of NAND elements, kind of Mealy machine.
reply
tonetegeatinst
5 months ago
[-]
Looking forward to the poor security researcher who gets to reverse engineer some malware sample they compiles this into for obfuscation... Its going to be an interesting blog post.
reply
jkrshnmenon
5 months ago
[-]
I wonder if someone has already made a Reverse Engineering CTF challenge for this concept.
reply
tomhee
5 months ago
[-]
reply
jkrshnmenon
5 months ago
[-]
I would also be very curious to see if it's possible to make a decompiler for this type of obfuscated program.
reply
saagarjha
5 months ago
[-]
Typically these obfuscators are applied in an automated fashion so yes.
reply
jkrshnmenon
5 months ago
[-]
DEFCON Quals challenge incoming.
reply
saagarjha
5 months ago
[-]
Please no we’ve already suffered enough :(
reply
og2023
5 months ago
[-]
I read it as reverse engineering WTF challenge... cool stuff though, seriously.
reply
dlcarrier
5 months ago
[-]
Maxim (now owned by Analog) actually manufactures a single-instruction processor series, called MAXQ. It uses a single move instruction, with a flag for literals, and a transport triggered architecture.
reply
Zamiel_Snawley
5 months ago
[-]
What is the intended use case for such a processor?
reply
dlcarrier
5 months ago
[-]
They are embedded microcontrollers, which run real-time deterministic tasks, with tens to hundreds of MIPS on fixed-point tasks. These are the kinds of microcontrollers used in products like household appliances or control systems.
reply
jvanderbot
5 months ago
[-]
Is the family of circuits using just NOT gates actually universal? Or is "flip" and "jump" secretly using a lot of other gates.
reply
tomhee
5 months ago
[-]
The power is within the self modification of the code. The jump might be implemented by a multiplexer, though it can be implemented in other ways too.
reply
jvanderbot
5 months ago
[-]
A CNOT is universal (transistor effectively) I don't think a NOT is universal.

I'm sure you can self modify your code so it executes only using XOR (bit flips), which is a CNOT, but I do not think this could be compiled down to an FPGA using only a billion not gates.

Actually I just convinced myself you can make an AND from three NOT gates if you can tie outputs together to get OR, so I believe you now. Sorry for the diversion! (Though I still dont see how bit flips and jumps directly can be built into a circuit, I know AND and NOT are universal so it's all good).

reply
Imustaskforhelp
5 months ago
[-]
hey this could actually be pretty nice if we can convert flipjump into sqlite native instructions like how it is possible for brainfuck , then you are on to something huge!

You would create although highly inefficient , after many years , maybe the first , language like those lisps where you could store data in sqlite and run it fromt there (but with C)

reply
tomhee
5 months ago
[-]
That's cool! And that's possible. Do you have any more data to read about it?
reply
Imustaskforhelp
5 months ago
[-]
I really hope that you try this , this might be game changing !
reply
Imustaskforhelp
5 months ago
[-]
see this / my comments on here

https://news.ycombinator.com/item?id=42637304

reply
Nevermnd
5 months ago
[-]
Did I miss something? I thought NAND was you're 'universal gate' ?
reply
artemonster
5 months ago
[-]
Id appreciate more explanations from the power of combined bitflip & goto
reply
tomhee
5 months ago
[-]
Sure!

https://github.com/tomhea/flip-jump/wiki/Learn-FlipJump

This will let you understand how to implement the very basic "if" in flipjump.

I tried to make it as easy for newcomers, but please feel free and update me if something is written complicated.

After you understand up to the macros, you can try yourself to understand the xor macro, which most of the library is built based on it: https://github.com/tomhea/flip-jump/blob/fe51448932e78db7d76...

reply
platz
5 months ago
[-]
How is a jump realized by Not Gates?
reply
tomhee
5 months ago
[-]
I dont think that the jump can be realized by NOT gates, but it's essentially "where to find the next NOT command". The jump is indeed a crucial part of the language, as it allows going back, and especially to make self-modifying code.
reply
Jerrrry
5 months ago
[-]
I'm guessing by not jumping into a terminating/ halting NOOP.

The logic is within the branching.

reply
jumploops
5 months ago
[-]
AND, OR, NOT - pick 2
reply
sroussey
5 months ago
[-]
NOR - pick 1
reply
falcor84
5 months ago
[-]
Or equivalently NAND, leading to the usual recommendation about NAND to Tetris - https://www.nand2tetris.org/
reply
dang
5 months ago
[-]
Looks like we banned you and this domain because of the egregious vote manipulation and bogus comments at https://news.ycombinator.com/item?id=34856792.

That was a long time ago, though, and the project is interesting enough, so I'm going to assume you've learned your lesson and unban you. Please stop using multiple accounts for this though!

reply
tomhee
5 months ago
[-]
Thanks man, I appreciate it.
reply
jimbob45
5 months ago
[-]
Dang, I have to know what triggered you to say this. It’s not the same user account so you would have had to have recognized the URL and written based on that.

Do you keep notes on each astroturfed submission and auto-trigger reposts to notify yourself? Or did you just happen to recognize this? 20 minutes from his post to your comment is absurdly good moderation.

reply
dang
5 months ago
[-]
https://news.ycombinator.com/item?id=42742462 was on the front page. We got an email suggesting that the URL should be https://github.com/tomhea/c2fj instead of https://github.com/tomhea/flip-jump. That made sense, except it turned out that github.com/tomhea was banned. That seemed odd because we don't normally ban github domains, so I looked at the history https://news.ycombinator.com/from?site=github.com%2Ftomhea (most of which will only be visible to users who have 'showdead' set to 'yes' in their profile), and it was pretty easy to see that https://news.ycombinator.com/item?id=34856792 was, let's call it, the original sin in this chain of woe. It was also pretty obvious that the other submitting accounts were all related. Since the project itself is interesting I figured the best thing to do was give the submitter a second chance, so I picked the earlier post from today (the OP) and swapped it out for the other one (42742462).

I hope that answers your question!

reply
doormatt
5 months ago
[-]
You sir, are amazing. Thank you for being so utterly transparent.
reply