Do inline functions reverse compiled binary?

So basically, besides the possible performance effects, the attachment functions have some significant effect on how difficult it is to reprogram the program from its compiled and linked binaries?

I mean, this should be, since 1) the cracker just sees more machine instructions, instead of the nice, clear “call XXXXX” that he might already have discovered to do something. and 2) inlining provides more options for the compiler to optimize the code, and this is even more obfuscated, right?

Also, given the inline keyword is just a suggestion for the compiler, how much can the effect really be? Should we bother? I mean, of course, they will eventually hack it, but if with such simple measures we can make the life of a cracker more difficult, why not?

+4
source share
2 answers

The choice of built-in methods or not should not be based on how easy it is to redesign. The difference between the investment and will not be negligible.

The exception is that if you have any anti-piracy code by inserting it or even using macros to make sure that it is inlined, it can help remove one point of failure.

If you are concerned about this, I suggest exploring the obfuscation tools that work with binary code.

+2
source

This will reduce the similarity between your input and its output. This generally will not have much impact on his efforts in general, though.

+1
source

Source: https://habr.com/ru/post/1346833/


All Articles