[重要]混淆器 [英] [IMPORTANT] obfuscators

查看:64
本文介绍了[重要]混淆器的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

先生们,


我意识到代码安全很容易被廉价的反编译器破坏。

微软建议使用什么来禁用或至少使用入侵者无法对DLL或EXE进行逆向工程。


谢谢,


Yama Kamyar

Gentlemen,

I realized that code security can easily be corrupted by cheap decompilers.
What does Microsoft suggest using to disable or at the least make it
impossible for the intruder to reverse engineer DLLs or EXEs.

Thanks,

Yama Kamyar

推荐答案

只有一种方法可以阻止某人对二进制文件进行逆向工程 - 不要给他们二进制文件,只提供远程访问。一旦你给他们你的二进制文件,那么你就会对逆向工程的成本与他们从逆向工程中获得的好处进行争斗。


例如,逆向工程的工业强度密码算法给出了ytooiu没有什么,因为算法是公共知识(一般而言)和密码学,仅仅因为其性质很难破解。逆向工程MS Word不会为你提供关于howq Word工作的大量信息,因为它的复杂性生活在宏观层面,而不是在每个方法中。如此多的应用程序只是没有提供逆向工程的好处。


如果你必须提供二进制文件并且它确实有代码中的IP(如新的视频编解码器),那么你有两个选择:在非托管代码中使用混淆或构建敏感操作并使用互操作。后者将逆向工程难度提升到与.NET之前的世界相同的水平。


问候


Richard Blewett - DevelopMentor http://www.dotnetconsult.co.uk/weblog
http://www.dotnetconsult.co.uk


nntp://news.microsoft.com/microsoft.public.dotnet.languages.csharp/< BD ******************** **************@microsoft.co m>


先生们,


我意识到代码安全性很容易被廉价的反编译器破坏。

微软建议使用什么来禁用或至少使它成为入侵者无法对DLL或EXE进行反向工程的
。 br />

谢谢,


Yama Kamyar

There is only one way to stop someone reverse engineering your binary - don''t give them the binary, only provide remote access. Once you have given them your binary then you are in a battle as to the cost in reverse engineering compared with the benefit they will get from reverse engineering.

For example, reverse engineering an industrial strength cryptography algorithm gives ytooiu nothing as the algorithm is public knowledge (in general) and the cryptography, just by its nature is hard to crack. Reverse engineering MS Word would not give you a huge amout of information about howq Word works as its complexity lives at the macro level not within each method. So many application just provide no benefit from reverse engineering.

If you must supply the binary and it does have IP in teh code (like a new video CODEC) then you have two options: obfuscation or building the sensitive operation in non-managed code and using interop. The latter takes the reverse engineering difficulty to the same level as the world before .NET.

Regards

Richard Blewett - DevelopMentor
http://www.dotnetconsult.co.uk/weblog
http://www.dotnetconsult.co.uk

nntp://news.microsoft.com/microsoft.public.dotnet.languages.csharp/<BD**********************************@microsoft.co m>

Gentlemen,

I realized that code security can easily be corrupted by cheap decompilers.
What does Microsoft suggest using to disable or at the least make it
impossible for the intruder to reverse engineer DLLs or EXEs.

Thanks,

Yama Kamyar


只有一个阻止某人逆向工程你的二进制文件的方法y - 不给他们二进制文件,只提供远程访问。一旦你给他们你的二进制文件,那么你就会对逆向工程的成本与他们从逆向工程中获得的好处进行争斗。


例如,逆向工程的工业强度密码算法给出了ytooiu没有什么,因为算法是公共知识(一般而言)和密码学,仅仅因为其性质很难破解。逆向工程MS Word不会为你提供关于howq Word工作的大量信息,因为它的复杂性生活在宏观层面,而不是在每个方法中。如此多的应用程序只是没有提供逆向工程的好处。


如果你必须提供二进制文件并且它确实有代码中的IP(如新的视频编解码器),那么你有两个选择:在非托管代码中使用混淆或构建敏感操作并使用互操作。后者将逆向工程难度提升到与.NET之前的世界相同的水平。


问候


Richard Blewett - DevelopMentor http://www.dotnetconsult.co.uk/weblog
http://www.dotnetconsult.co.uk


nntp://news.microsoft.com/microsoft.public.dotnet.languages.csharp/< BD ******************** **************@microsoft.co m>


先生们,


我意识到代码安全性很容易被廉价的反编译器破坏。

微软建议使用什么来禁用或至少使它成为入侵者无法对DLL或EXE进行反向工程的
。 br />

谢谢,


Yama Kamyar

There is only one way to stop someone reverse engineering your binary - don''t give them the binary, only provide remote access. Once you have given them your binary then you are in a battle as to the cost in reverse engineering compared with the benefit they will get from reverse engineering.

For example, reverse engineering an industrial strength cryptography algorithm gives ytooiu nothing as the algorithm is public knowledge (in general) and the cryptography, just by its nature is hard to crack. Reverse engineering MS Word would not give you a huge amout of information about howq Word works as its complexity lives at the macro level not within each method. So many application just provide no benefit from reverse engineering.

If you must supply the binary and it does have IP in teh code (like a new video CODEC) then you have two options: obfuscation or building the sensitive operation in non-managed code and using interop. The latter takes the reverse engineering difficulty to the same level as the world before .NET.

Regards

Richard Blewett - DevelopMentor
http://www.dotnetconsult.co.uk/weblog
http://www.dotnetconsult.co.uk

nntp://news.microsoft.com/microsoft.public.dotnet.languages.csharp/<BD**********************************@microsoft.co m>

Gentlemen,

I realized that code security can easily be corrupted by cheap decompilers.
What does Microsoft suggest using to disable or at the least make it
impossible for the intruder to reverse engineer DLLs or EXEs.

Thanks,

Yama Kamyar


谢谢理查德。


Mic的混淆软件是什么rosoft提供?建议?


谢谢,


Yama

" Richard Blewett [DevelopMentor]" < RI ****** @ NOSPAMdevelop.com>写在

消息新闻:OL ************** @ tk2msftngp13.phx.gbl ...
Thanks Richard.

What obfuscation software does Microsoft provide? suggest?

Thanks,

Yama
"Richard Blewett [DevelopMentor]" <ri******@NOSPAMdevelop.com> wrote in
message news:OL**************@tk2msftngp13.phx.gbl...
只有一种方法阻止某人逆向工程你的二进制文件 -
不给他们二进制文件,只提供远程访问。一旦你给他们你的二进制文件,那么你就是反向工程的成本与他们从反向工程中获得的好处的战斗。
例如,逆向工程的工业强度密码算法算法没有任何关系,因为算法是公共知识(一般而言)和密码学,只是因为它的性质很难破解。
反向工程MS Word不会给你很多关于howq Word工作的信息,因为它的复杂性生活在宏观层面而不是每种方法。如此多的应用程序只是没有提供逆向工程的好处。

如果你必须提供二进制文件并且它确实有代码中的IP(如新的视频编解码器)那么你有两个选项:混淆或在非托管代码中构建
敏感操作并使用互操作。后者在.NET之前将逆向工程难度提升到与世界相同的水平。

问候

Richard Blewett - DevelopMentor http://www.dotnetconsult.co.uk/weblog
http://www.dotnetconsult.co.uk

nntp://news.microsoft.com/microsoft.public.dotnet.languages.csharp/< BD ************************ **********@microsoft.co m>

先生们,

我意识到廉价的反编译器很容易破坏代码安全性。
微软建议使用什么来禁用或至少使入侵者无法对DLL或EXE进行逆向工程。

谢谢,
Yama Kamyar
There is only one way to stop someone reverse engineering your binary -
don''t give them the binary, only provide remote access. Once you have
given them your binary then you are in a battle as to the cost in reverse
engineering compared with the benefit they will get from reverse
engineering.

For example, reverse engineering an industrial strength cryptography
algorithm gives ytooiu nothing as the algorithm is public knowledge (in
general) and the cryptography, just by its nature is hard to crack.
Reverse engineering MS Word would not give you a huge amout of information
about howq Word works as its complexity lives at the macro level not
within each method. So many application just provide no benefit from
reverse engineering.

If you must supply the binary and it does have IP in teh code (like a new
video CODEC) then you have two options: obfuscation or building the
sensitive operation in non-managed code and using interop. The latter
takes the reverse engineering difficulty to the same level as the world
before .NET.

Regards

Richard Blewett - DevelopMentor
http://www.dotnetconsult.co.uk/weblog
http://www.dotnetconsult.co.uk
nntp://news.microsoft.com/microsoft.public.dotnet.languages.csharp/<BD**********************************@microsoft.co m>

Gentlemen,

I realized that code security can easily be corrupted by cheap
decompilers.
What does Microsoft suggest using to disable or at the least make it
impossible for the intruder to reverse engineer DLLs or EXEs.

Thanks,

Yama Kamyar



这篇关于[重要]混淆器的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆