Date: Mon, 18 Feb 2008 21:44:59 -0700 (MST) From: "M. Warner Losh" <imp@bsdimp.com> To: keramida@ceid.upatras.gr Cc: freebsd-hackers@FreeBSD.org, dimitry@andric.com, jrytoung@gmail.com Subject: Re: encrypted executables Message-ID: <20080218.214459.-861064602.imp@bsdimp.com> In-Reply-To: <20080219040912.GA14809@kobe.laptop> References: <47BA3334.4040707@andric.com> <86068e730802181954t52e4e05ay65e04c5f6de9b78a@mail.gmail.com> <20080219040912.GA14809@kobe.laptop>
next in thread | previous in thread | raw e-mail | index | archive | help
In message: <20080219040912.GA14809@kobe.laptop> Giorgos Keramidas <keramida@ceid.upatras.gr> writes: : On 2008-02-18 19:54, Jerry Toung <jrytoung@gmail.com> wrote: : >On Feb 18, 2008 5:39 PM, Dimitry Andric <dimitry@andric.com> wrote: : >>On 2008-02-19 02:18, Jerry Toung wrote: : >>> anybody knows of a tool to encrypt executables under FreeBSD? may be : >>> from the ports? I am not talking about simple file encryption. : >> : >> Can you elaborate on what you *are* talking about then? Some : >> security-by-obscurity scheme, perhaps? :) : > : > I need to encrypt elf binaries. I'd like to make it harder for the bad : > guy to reverse engineer my app. : : You know about truss/ktrace/strace already, right? : : It may be moot to encrypt the ELF binary, if the `bad guy' can access : the running image of the process *after* it has been decrypted to : execute. kill -ABRT will generate a core file. Often times, the core file can be quite useful in recovering the original executable. emacs has used this technique for years to 'preload' stuff, take a core dump, then re-run the core file after some post-processing. Warner
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080218.214459.-861064602.imp>