Cellar Door

05 декабря 2005

Armouring the ELF, Phrack Magazine #58

Крайне любопытную идею встретил, читая Armouring the ELF: Binary encryption on the UNIX platform by grugq and scut:
The following is a short list of encryption methods that have been used to protect the main object code of the executable:
[:..12 lines skipped..:]
  • Virtual CPUs: A painstaking and powerful method of securing a binary. The object code actually runs on a virual CPU that needs to be independantly analysed first. Very painful for a reverse engineer (and also the developer).
Весьма увлечен, отправляюсь на поиски примеров реализации такого подхода...