by spatulon on 2/22/23, 10:51 AM with 2 comments
by sim7c00 on 2/22/23, 11:36 AM
Well done! :) Really curious how this would be implemented. with some struct.secret_fields or an actual data section in the executables involved, or some other methods. Also how they trace this access, done via self-debugging or some custom data access helper which tracks what data is accessed? Especially on the last part I'd be curious about how it works as in my mind performance is tricky in games, and adding data fields, sections and especially tracing access to them can eat some of those nanoseconds needed so much in modern games.
Anyone have some insights? Not looking for specifics, but honestly, more software should secure itself from tampering and track bad behaviors or intent better. Information on how to properly do that is largely proprietary and can be quite difficult to reason about and test thoroughly unless you have an active user base targeting your software for exploitation already (games,browsers,system services?).
by lordkrandel on 2/23/23, 7:47 AM