On 16 Jul 2010, at 12:56, Žilvinas Ledas wrote:
I want to implement kind of executable protection using software guards (*)
- when function (caller) decrypts another function (callee) before calling it
and encrypts it again after callee returns.
As a result I need to get addresses of my
Hello all,
I want to implement kind of executable protection using software
guards (*) - when function (caller) decrypts another function (callee)
before calling it and encrypts it again after callee returns.
As a result I need to get addresses of my functions (where the asm code
starts and