Executable Protection - Summary

NOTE: This is not a tutorial -- it is a memo. I won't list detail implementation of the techniques used in these articles, instead, I want to record why I choose those techniques. Also, I won't repeat those basic concepts -- I assume you guys already knows those.
Read More