How to protect hacker modify jump location ?

  • Thread starter Thread starter Boki Digtal
  • Start date Start date
B

Boki Digtal

Hi All,

After we did a lot of copy-protection code in program, I think hacker
can still use ICE to trace where it jumps to and then modify the
target location (address).

Finally, what we can do is the same as car, we can only do more to
protect more, nothing can absolutely solve this issue.

And this is why Microsoft loss so much revenue, my original thinking
is - in order to grow up the market, we have to allow something
underground first, right ?

Best regards,
Boki.
 
After we did a lot of copy-protection code in program, I think hacker
can still use ICE to trace where it jumps to and then modify the
target location (address).

Finally, what we can do is the same as car, we can only do more to
protect more, nothing can absolutely solve this issue.

And this is why Microsoft loss so much revenue, my original thinking
is - in order to grow up the market, we have to allow something
underground first, right ?

You'll never get "perfect" protection - if the client's computer has
to be able to run your code, it *will* be hackable. Once you
understand that, it's a cost/benefit analysis - how much effort do you
want to put in vs how many sales you'll lose.

I tend to believe that it's not worth spending a lot of time on this.
Perhaps obfuscate, but that's about it.

Jon
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Back
Top