Request: tamper-proofing executables
Roger Bryner
bryner at atlas.chem.utah.edu
Sun Jul 10 18:06:19 PDT 1994
How about a different tack, having all branch instructions feed in some
number from the program, generated from the state of the program, to a
lookup hard-key. The program then branches to the appropriate site.
If the number of branches/states of program was great enough, this might be
secure(of cource, they can just watch it and recode, but they could
probably re-write the code for this ammount.)
Roger.
More information about the cypherpunks-legacy
mailing list