In this chapter, we revealed the inner workings of basic binary protection schemes for Linux binaries, and discussed the various features of existing binary protectors that have been released for Linux over the last decade.
In the next chapter, we will be exploring things from the opposite angle and begin looking at ELF binary forensics in Linux.