Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Is it possible to dump the ram and get an exe and use that ram dump to distribut

ID: 655594 • Letter: I

Question

Is it possible to dump the ram and get an exe and use that ram dump to distribute an app? If so, is this something that is a practical concern and if so how best should a developer protect against it?

I ask because I'm considering encyrypting my app by nesting keys within nested features/widgets. When a feature/widget is dormant (not used yet) it will be encrypted. When it is used it will be decrypted along with another key to a nested feature/widget inside it. If it's more difficult to reverse engineer that than an exe not encrypted on the hard drive than I would buy some slow down time.

This is the context of why I'm asking if gettng the exe from ram and piecing it together as a distributable exe. I'm assuming if I encrypt in a nested fashion described above it may slow down a potential reverse engineer attempt. I wanted to be clear with my question so I didn't describe why I'm asking, but I hope this bring some clearity.

Explanation / Answer

It's possible to design operating systems, or individual programs, so this is possible. With debugger-level access to a running application, you could probably reconstruct a close approximation to the the exe which launched it. However, that wouldn't necessarily put you in any better position to distribute the app than if you just copied the original bits.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote