Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


Program Overlay access/encryption and security

Posted on 2009-05-20
Medium Priority
Last Modified: 2012-05-07
I have an EXE that is actually SWF player with overlay containing the SWF with "treasure" data inside. Is there any solution to protect this overlay part of code? All protectors so far focus only on actual EXE code but after heavy protection they just append unprotected Overlay at the end.

Is there any working code for doing this? Some secured access. Preferrably in Delphi.

Could somebody advise what is the best solution for this, or share some links for books/articles dealing with the topic.  
Question by:Arnie007
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
LVL 23

Accepted Solution

Mohamed Osama earned 2000 total points
ID: 24435528
I am not exactly sure I understand you fully ,but a couple of years ago ,using something like telock , would have made reverse engineering an executable really difficult, should play nice with Delphi.


Author Comment

ID: 24435987
The problem with all those protectors (like telock) is that they protect only main exe and just append the overlay unprotected. Thus I want some advice how to manage/secure access to file overlay (probably I would first encrypt it).

Expert Comment

ID: 24448387
u can encrypt the whole exe (with its resources and overlay data or whatever) and put it in another exe which will decrypt it in memory during runtime and run it from memory without writing to disk, so they wont be able to reach it

Author Comment

ID: 24448772
@KillerCode: Is there any simple/cheap EXE2EXE compressor you mentioned in your post?

Expert Comment

ID: 24449906
i guess so if EXE2EXE means encrypting an exe and putting it in the resources of the other then yet
but u will add encryption to it (RC4/AES/DES)

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let's recap what we learned from yesterday's Skyport Systems webinar.
What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question