Reversing : The Hacker's Guide to Reverse Engineering

(ff) #1

just how long it is going to take crackers before they manage to lift that barrier.
A more effective solution is to employ hardware-level solutions, but these can
often create a significant negative impact on legitimate users, such as
increased product costs, and reduced performance or reliability.
The next chapters demonstrate the actual techniques that are commonly
used for preventing reverse engineering and for creating tamper-proof soft-
ware that can’t be easily modified. I will then proceed to demonstrate how
crackers typically attack copy protection technologies.


Piracy and Copy Protection 325
Free download pdf