For example, the attacker could bypass the routine that checks for the trial period in an application and make it run forever or even worse, cause the application to behave as if it was registered. When the attacker has a good knowledge of the target application, he can modify the compiled application to alter his behavior. These tools are known as dissemblers and de-compilers.įigure 2: Decompilation of your applicationĪn attacker can use a dissembler or de-compiler to study how a specific application works and what a specific routine does. ![]() In the same manner that the source code of an application is converted into machine code at compilation time, there are tools that can convert a compiled application into assembly language or a higher programming language. Then the object files are linked together to create the final executable.įigure 1: Compilation of your source code ![]() When an application is being created, the Compiler will compile the application source code into several object files made of machine language code.
0 Comments
Leave a Reply. |