• <small id='4F75D'></small><noframes id='4F75D'>

      • <bdo id='4F75D'></bdo><ul id='4F75D'></ul>
    1. <legend id='4F75D'><style id='4F75D'><dir id='4F75D'><q id='4F75D'></q></dir></style></legend>

        <tfoot id='4F75D'></tfoot>
        <i id='4F75D'><tr id='4F75D'><dt id='4F75D'><q id='4F75D'><span id='4F75D'><b id='4F75D'><form id='4F75D'><ins id='4F75D'></ins><ul id='4F75D'></ul><sub id='4F75D'></sub></form><legend id='4F75D'></legend><bdo id='4F75D'><pre id='4F75D'><center id='4F75D'></center></pre></bdo></b><th id='4F75D'></th></span></q></dt></tr></i><div id='4F75D'><tfoot id='4F75D'></tfoot><dl id='4F75D'><fieldset id='4F75D'></fieldset></dl></div>

        保护可执行文件免受逆向工程?

        时间:2023-08-01
      1. <tfoot id='E1Fon'></tfoot>

        1. <i id='E1Fon'><tr id='E1Fon'><dt id='E1Fon'><q id='E1Fon'><span id='E1Fon'><b id='E1Fon'><form id='E1Fon'><ins id='E1Fon'></ins><ul id='E1Fon'></ul><sub id='E1Fon'></sub></form><legend id='E1Fon'></legend><bdo id='E1Fon'><pre id='E1Fon'><center id='E1Fon'></center></pre></bdo></b><th id='E1Fon'></th></span></q></dt></tr></i><div id='E1Fon'><tfoot id='E1Fon'></tfoot><dl id='E1Fon'><fieldset id='E1Fon'></fieldset></dl></div>
            • <bdo id='E1Fon'></bdo><ul id='E1Fon'></ul>
              <legend id='E1Fon'><style id='E1Fon'><dir id='E1Fon'><q id='E1Fon'></q></dir></style></legend>
                  <tbody id='E1Fon'></tbody>

                <small id='E1Fon'></small><noframes id='E1Fon'>

                • 本文介绍了保护可执行文件免受逆向工程?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

                  问题描述

                  我一直在考虑如何保护我的 C/C++ 代码免遭反汇编和逆向工程.通常我不会在我的代码中容忍这种行为;然而,为了各种人的安全,我一直在研究的当前协议绝不能被检查或理解.

                  I've been contemplating how to protect my C/C++ code from disassembly and reverse engineering. Normally I would never condone this behavior myself in my code; however the current protocol I've been working on must not ever be inspected or understandable, for the security of various people.

                  现在这对我来说是一个新主题,而且互联网在防止逆向工程方面并不是真正的资源丰富,而是描述了关于如何进行逆向工程的大量信息

                  Now this is a new subject to me, and the internet is not really resourceful for prevention against reverse engineering but rather depicts tons of information on how to reverse engineer

                  到目前为止我想到的一些事情是:

                  Some of the things I've thought of so far are:

                  • 代码注入(在实际函数调用前后调用伪函数)
                  • 代码混淆(破坏二进制文件的反汇编)
                  • 编写我自己的启动例程(调试器更难绑定)

                  • Code injection (calling dummy functions before and after actual function calls)
                  • Code obfustication (mangles the disassembly of the binary)
                  • Write my own startup routines (harder for debuggers to bind to)

                  void startup();  
                  int _start()   
                  {  
                      startup( );  
                      exit   (0)   
                  }  
                  void startup()  
                  {  
                      /* code here */  
                  }
                  

                • 运行时检查调试器(如果检测到则强制退出)

                • Runtime check for debuggers (and force exit if detected)

                  功能蹦床

                   void trampoline(void (*fnptr)(), bool ping = false)  
                   {  
                     if(ping)  
                       fnptr();  
                     else  
                       trampoline(fnptr, true);  
                   }
                  

                • 无意义的分配和释放(堆栈变化很大)

                • Pointless allocations and deallocations (stack changes a lot)

                  我的意思是这些是我想到的一些事情,但它们都可以解决或由代码分析师在适当的时间范围内解决.我还有其他选择吗?

                  I mean these are some of the things I've thought of but they can all be worked around and or figured out by code analysts given the right time frame. Is there anything else alternative I have?

                  推荐答案

                  Amber 说的完全正确.您可以使逆向工程更加困难,但您永远无法阻止它.您永远不应该相信依赖于逆向工程预防的安全性".

                  What Amber said is exactly right. You can make reverse engineering harder, but you can never prevent it. You should never trust "security" that relies on the prevention of reverse engineering.

                  也就是说,我所见过的最好的反逆向工程技术的重点不是混淆代码,而是破坏人们通常用来理解代码如何工作的工具.与仅仅生成大量可怕的意大利面条式代码相比,寻找创造性的方法来破解反汇编器、调试器等可能更有效,而且在智力上也更令人满意.这对阻止坚定的攻击者没有任何作用,但它确实增加了 J Random Cracker 徘徊并做一些更容易的事情的可能性.

                  That said, the best anti-reverse-engineering techniques that I've seen focused not on obfuscating the code, but instead on breaking the tools that people usually use to understand how code works. Finding creative ways to break disassemblers, debuggers, etc is both likely to be more effective and also more intellectually satisfying than just generating reams of horrible spaghetti code. This does nothing to block a determined attacker, but it does increase the likelihood that J Random Cracker will wander off and work on something easier instead.

                  这篇关于保护可执行文件免受逆向工程?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持html5模板网!

                • 上一篇:什么 C/C++ 编译器可以使用 push pop 指令来创建局部 下一篇:GCC 内联汇编中的标签

                  相关文章

                  最新文章

                • <i id='eO8ll'><tr id='eO8ll'><dt id='eO8ll'><q id='eO8ll'><span id='eO8ll'><b id='eO8ll'><form id='eO8ll'><ins id='eO8ll'></ins><ul id='eO8ll'></ul><sub id='eO8ll'></sub></form><legend id='eO8ll'></legend><bdo id='eO8ll'><pre id='eO8ll'><center id='eO8ll'></center></pre></bdo></b><th id='eO8ll'></th></span></q></dt></tr></i><div id='eO8ll'><tfoot id='eO8ll'></tfoot><dl id='eO8ll'><fieldset id='eO8ll'></fieldset></dl></div>
                  <legend id='eO8ll'><style id='eO8ll'><dir id='eO8ll'><q id='eO8ll'></q></dir></style></legend>

                • <tfoot id='eO8ll'></tfoot>

                  <small id='eO8ll'></small><noframes id='eO8ll'>

                  • <bdo id='eO8ll'></bdo><ul id='eO8ll'></ul>