Click here to Skip to main content
15,917,709 members
Please Sign up or sign in to vote.
0.00/5 (No votes)
See more:
Hi My question is quite simple.
Can I execute an EXE or load a DLL from memory mapped file?
This need arises for security reasons(to prevent reverse engineering).
I build an EXE or DLL, encrypt it as a whole and embed it in my application, possibly in some EXE file (as data). At run time, I decrypt it and write it to a memory mapped file and then execute exe or load dll.
Other suggestions to prevent reverse engineering also appreciated.
My EXE and DLL are built with native c++(visual studio 2010)

mr.abzadeh
Posted
Comments
Niklas L 22-Sep-11 6:26am    
As a note, you will never be able to prevent reverse engeneering, only make it harder. One would still have the possibility of running a debugger on your exe, wait for it to decrypt the secret portion, and then figure out what's in there.
mr.abzadeh 23-Sep-11 2:15am    
Yes, In know this. I want to make reverse eng harder and time consuming. and many hacker will give up reverse eng if it is hard, also, note that a debugger waiting to finish decode will se the original code, but will not normally be enable to write back the original code to a dll or exe unless he or she has a comprehensive knowlege of portable executable structure and windows loader,
Thanks for your note

1 solution

 
Share this answer
 
v2

This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)



CodeProject, 20 Bay Street, 11th Floor Toronto, Ontario, Canada M5J 2N8 +1 (416) 849-8900