Show HN: Compile C to Not Gates
81 points
6 hours ago
| 12 comments
| github.com
| HN
Hi! I've been working on the flipjump project, a programming language with 1 opcode: flip (invert) a bit, then jump (unconditionally). So a bit-flip followed by more bit-flips. It's effectively a bunch of NOT gates. This language, as poor as it sounds, is RICH.

Today I completed my compiler from C to FlipJump. It takes C files, and compiles them into flipjump. I finished testing it all today, and it works! My key interest in this project is to stretch what we know of computing and to prove that anything can be done even with minimal power.

I appreciate you reading my announcement, and be happy to answer questions.

More links:

- The flipjump language: https://github.com/tomhea/flip-jump https://esolangs.org/wiki/FlipJump

- c2fj python package https://pypi.org/project/c2fj/

bangaladore
5 hours ago
[-]
Reminds me of movfuscator [1]. This can compile programs to movs and only movs.

[1] https://github.com/Battelle/movfuscator

reply
LPisGood
3 hours ago
[-]
Battelle is great. They also created some software called Cantor Dust [1] that turns files into images to allow humans to easily spot obfuscated data or files.

The sad thing about this kind of work, because I love it, is that to get paid to do it you need clearances and polygraphs and periodic reinvestigations/continuous monitoring and all sorts of things that I find unpleasant.

[1] https://github.com/Battelle/cantordust

reply
mmastrac
2 hours ago
[-]
I'm not sure what you mean but I was a security researcher for a large company for a bit and required none of that. I was required to work airgapped at home, however.
reply
LPisGood
2 hours ago
[-]
Really? You were doing offensive security work not for a government (/contractor)? What sorts companies, aside from some enterprise pen testers, employ these roles?
reply
mmastrac
2 hours ago
[-]
Email is in my profile -- happy to clarify/share some very rough details if you'd like.
reply
beng-nl
1 hour ago
[-]
Agreed that is a fine piece of work. But the author is Chris Domas. Which is plain from the repo readme, but it’d be clearer to link to his repo.
reply
bangaladore
10 minutes ago
[-]
I was originally going to link their repo [1]. But I saw it was forked from the one I linked so I just gave that one instead.

[1] https://github.com/xoreaxeaxeax/movfuscator

reply
tromp
4 hours ago
[-]
Am I right in deducing that this language gets its power from self-modifying code? I.e. flipping bits within addresses of the opcodes of the running program?
reply
tomhee
4 hours ago
[-]
You are indeed right
reply
tromp
4 hours ago
[-]
I would have expected the language documentation to focus more on this observation and to explain for instance how self modification is used to implement while loops. But I don't even see the term mentioned anywhere?!
reply
tomhee
4 hours ago
[-]
Good point! It's mentioned in the github wiki here: https://github.com/tomhea/flip-jump/wiki/Learn-FlipJump#memo...

It was once in the Readme but as I kept developing it more it become longer and longer, so I moved it into the wiki, and especially to here: https://esolangs.org/wiki/FlipJump

reply
tonetegeatinst
1 hour ago
[-]
Looking forward to the poor security researcher who gets to reverse engineer some malware sample they compiles this into for obfuscation... Its going to be an interesting blog post.
reply
jkrshnmenon
3 hours ago
[-]
I wonder if someone has already made a Reverse Engineering CTF challenge for this concept.
reply
og2023
1 hour ago
[-]
I read it as reverse engineering WTF challenge... cool stuff though, seriously.
reply
tomhee
3 hours ago
[-]
reply
jkrshnmenon
2 hours ago
[-]
I would also be very curious to see if it's possible to make a decompiler for this type of obfuscated program.
reply
pizza
3 hours ago
[-]
Ah interesting.. wonder if you can model this with a recursively expanded algebraic expression. I've been thinking lately along similar lines about polynomials that encode pushdown automata, so this is cool to see.
reply
tomhee
3 hours ago
[-]
If you have an answer I'd be happy to hear it!
reply
tomhee
5 hours ago
[-]
There is also a brainfuck to flipjump compiler: https://github.com/tomhea/bf2fj
reply
david-gpu
3 hours ago
[-]
Ah, the convenience of brainfuck with the performance of flipjump. Excellent.
reply
dlcarrier
4 hours ago
[-]
Maxim (now owned by Analog) actually manufactures a single-instruction processor series, called MAXQ. It uses a single move instruction, with a flag for literals, and a transport triggered architecture.
reply
tomhee
4 hours ago
[-]
By the way, as a challenge, try how you can program an "If" statement in Flipjump.
reply
platz
4 hours ago
[-]
How is a jump realized by Not Gates?
reply
tomhee
4 hours ago
[-]
I dont think that the jump can be realized by NOT gates, but it's essentially "where to find the next NOT command". The jump is indeed a crucial part of the language, as it allows going back, and especially to make self-modifying code.
reply
Jerrrry
4 hours ago
[-]
I'm guessing by not jumping into a terminating/ halting NOOP.

The logic is within the branching.

reply
jumploops
3 hours ago
[-]
AND, OR, NOT - pick 2
reply
sroussey
3 hours ago
[-]
NOR - pick 1
reply
artemonster
4 hours ago
[-]
Id appreciate more explanations from the power of combined bitflip & goto
reply
tomhee
4 hours ago
[-]
Sure!

https://github.com/tomhea/flip-jump/wiki/Learn-FlipJump

This will let you understand how to implement the very basic "if" in flipjump.

I tried to make it as easy for newcomers, but please feel free and update me if something is written complicated.

After you understand up to the macros, you can try yourself to understand the xor macro, which most of the library is built based on it: https://github.com/tomhea/flip-jump/blob/fe51448932e78db7d76...

reply
dang
5 hours ago
[-]
Looks like we banned you and this domain because of the egregious vote manipulation and bogus comments at https://news.ycombinator.com/item?id=34856792.

That was a long time ago, though, and the project is interesting enough, so I'm going to assume you've learned your lesson and unban you. Please stop using multiple accounts for this though!

reply
tomhee
5 hours ago
[-]
Thanks man, I appreciate it.
reply
jimbob45
5 hours ago
[-]
Dang, I have to know what triggered you to say this. It’s not the same user account so you would have had to have recognized the URL and written based on that.

Do you keep notes on each astroturfed submission and auto-trigger reposts to notify yourself? Or did you just happen to recognize this? 20 minutes from his post to your comment is absurdly good moderation.

reply
dang
5 hours ago
[-]
https://news.ycombinator.com/item?id=42742462 was on the front page. We got an email suggesting that the URL should be https://github.com/tomhea/c2fj instead of https://github.com/tomhea/flip-jump. That made sense, except it turned out that github.com/tomhea was banned. That seemed odd because we don't normally ban github domains, so I looked at the history https://news.ycombinator.com/from?site=github.com%2Ftomhea (most of which will only be visible to users who have 'showdead' set to 'yes' in their profile), and it was pretty easy to see that https://news.ycombinator.com/item?id=34856792 was, let's call it, the original sin in this chain of woe. It was also pretty obvious that the other submitting accounts were all related. Since the project itself is interesting I figured the best thing to do was give the submitter a second chance, so I picked the earlier post from today (the OP) and swapped it out for the other one (42742462).

I hope that answers your question!

reply
doormatt
3 hours ago
[-]
You sir, are amazing. Thank you for being so utterly transparent.
reply