Written in c # desktop small programs,
Assume that there will be a boring attackers to small program to add a virus spread again,
I think if you could send small programs do a tamper-proof detection, if detected program been tampered with, popups, let users do not use (best can not run),
Assuming that boring attackers will not be decompiled, need not consider stole the source code copy changes, they will only use the fool virus into exe,
The search on the net, VS come with "strong name assembly signature,"
But the problem is that at the beginning of the function design, only to prevent the DLL name repetition error, not to mention it is easy to remove to skip the strong name signature detection,
More the main problem is, I this desktop small procedures, refer to something without strong name open source DLL of digital signature, and according to the rules, strong name signature must all referenced DLL are already has a digital signature, it is clear that I can't take the things people open source to sign his name,
That if I write test, how do? If you include a file hash on our program, you can, how to compare? If I write should be the correct hash value to the program, the program of the hash is not changed again? If written to another file in the DLL, the somebody else directly change not to recognize a false is true? ,,
In real time to check it online? That should increase the network communication, too much trouble,
I don't need to fully decompiled tamper-proof, just want to tamper detection suggest this, how to implement?
CodePudding user response:
I thought for a moment, it seems to "check" "efficacy" is a little similar,I put a piece of data, for example, at the end of adding an additional value, through some algorithm, data in front of the calculated results with the test values are the same, can be effective,
However, how to save the inspection cost?
CodePudding user response:
Md5???