b3n
July 28th, 2007, 12:31
hello,
after i read 0rps post about his vm i developed my own little vm + compiler. i also used coco/r for the compiler part and a simple switch(opcode) structure to perform the interpretation of the byte code. then i tried to reverse engineer my own application which was not too hard. i wrote the whole thing in c++ and also included some opcodes to check for a debugger or encrypt a few byte code instructions. since the whole thing seems very static to me (the switch structure) i was wondering what i could do to make reverse engineering of my vm harder. it would be great if someone could drop me some ideas on what is possible and what would be useful in respect of using it in a vm.
thanks,
b3n
after i read 0rps post about his vm i developed my own little vm + compiler. i also used coco/r for the compiler part and a simple switch(opcode) structure to perform the interpretation of the byte code. then i tried to reverse engineer my own application which was not too hard. i wrote the whole thing in c++ and also included some opcodes to check for a debugger or encrypt a few byte code instructions. since the whole thing seems very static to me (the switch structure) i was wondering what i could do to make reverse engineering of my vm harder. it would be great if someone could drop me some ideas on what is possible and what would be useful in respect of using it in a vm.
thanks,
b3n

You might want to look at it by downloading Themida unpackmes off of tuts4you, or you could search for a certain tutorial on Code Virtualizer that analyzes its features. I won't post it here because its got instructions on how to patch Code Virtualizer itself, and from what I understand this website is going legit
But reading it is a great learning experience (I think).


