Categories
Security

Code Virtualizer Encrypting Security for Windows

Code Virtualizer – Total Obfuscation Against Reverse Engineering
Code Virtualizer is a powerful code-obfuscation system that helps developers protect their sensitive code areas against Reverse Engineering while requiring minimum system resources. Code Virtualizer can convert your original code (Intel x86 instructions) into Virtual Opcodes that will only be understood by an internal Virtual Machine.

Those Virtual Opcodes and the Virtual Machine itself are unique for every protected application, avoiding a general attack over Code Virtualizer. Code Virtualizer can protect your sensitive code areas in any x32 and x64 native PE files (like executable files/EXEs, system services, DLLs , OCXs , ActiveX controls, screen savers and device drivers).

Code virtualization consists of the transformation of binary code from a specific machine into a different binary code that is understood by another machine. That is, the instruction set from a specific machine is converted into a new instruction set which is understood by a different machine. Code Virtualizer can generate multiple types of virtual machines with a different instruction set for each one.

This means that a specific block of Intel x86 instructions can be converted into different instruction set for each machine, preventing an attacker from recognizing any generated virtual opcode after the transformation from x86 instructions. When an attacker tries to decompile a block of code that was protected by Code Virtualizer, he will not find the original x86 instructions. Instead, he will find a completely new instruction set which is not recognized by him or any other special decompiler.

This will force the attacker to go through the extremely hard work of identifying how each opcode is executed and how the specific virtual machine works for each protected application. Code Virtualizer totally obfuscates the execution of the virtual opcodes and the study of each unique virtual machine in order to prevent someone from studying how the virtual opcodes are executed.

Limitations:

· Some features are disabled

What’s New in This Release: [ read full changelog ]

· [ ] Added support to specify file to protect from command line (instead of application in project file)
· [ ] Improved search engine for MAP macros
· [ ] Improved reading of .CRM file (MAP macros)
· [!] Fixed definition of PureBasic macros (Thanks Mitchell Vincent and Terence Agius)
· [!] Fixed bug displaying functions when MAP macros and SDK macros are mixed together
· [!] Minor bugs fixed in 32-bit disassembler

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!