You are wrong, the only change that you can safely say the miners won't accept is changing the proof of work from SHA to something else.
Thanks Denton for this answer.
But what´s happening if additional Information has to be put into the input of the SHA hashing (like timestamps, Transaction ID´s etc.) so that they are not malleable any more.
Can this be done in software or is the ASIC hardware wired in a way lets say:
Input 2000 Bytes -->Output SHA(2000Bytes), but if you need 500 bytes more for the additional information, the current ASIC hardware is not capable of doing this?