Click here to Skip to main content
15,892,059 members
Articles / General Programming / Debugging

Anti-Debug Protection Techniques: Implementation and Neutralization

,
Rate me:
Please Sign up or sign in to vote.
4.97/5 (41 votes)
7 Apr 2016CPOL18 min read 79.1K   65  
Several approaches of anti-debug protection and some tips about how they are usually neutralized by reversers
This article describes a series of anti reverse engineering techniques, in particular anti-debug methods, starting with the simplest ones, as well as ways to neutralize them.

Views

Daily Counts

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)


Written By
Chief Technology Officer Apriorit Inc.
United States United States
ApriorIT is a software research and development company specializing in cybersecurity and data management technology engineering. We work for a broad range of clients from Fortune 500 technology leaders to small innovative startups building unique solutions.

As Apriorit offers integrated research&development services for the software projects in such areas as endpoint security, network security, data security, embedded Systems, and virtualization, we have strong kernel and driver development skills, huge system programming expertise, and are reals fans of research projects.

Our specialty is reverse engineering, we apply it for security testing and security-related projects.

A separate department of Apriorit works on large-scale business SaaS solutions, handling tasks from business analysis, data architecture design, and web development to performance optimization and DevOps.

Official site: https://www.apriorit.com
Clutch profile: https://clutch.co/profile/apriorit
This is a Organisation

33 members

Written By
Ukraine Ukraine
This member has not yet provided a Biography. Assume it's interesting and varied, and probably something to do with programming.

Comments and Discussions