Armouring the ELF, Phrack Magazine #58
Крайне любопытную идею встретил, читая Armouring the ELF: Binary encryption on the UNIX platform by grugq and scut:
The following is a short list of encryption methods that have been used to protect the main object code of the executable:Весьма увлечен, отправляюсь на поиски примеров реализации такого подхода...
[:..12 lines skipped..:]
- Virtual CPUs: A painstaking and powerful method of securing a binary. The object code actually runs on a virual CPU that needs to be independantly analysed first. Very painful for a reverse engineer (and also the developer).