:: Free article content
Authors: Maximum article exposure. Publishers: Reprintable article content.
Featured Articles
Recently Added Articles
Most Viewed Articles
Article Comments
Advanced Article Search
Submit Article
Check Article Status
Author TOS
RSS Article Feeds
Terms of Service

The Security Problem - Program Protection Against Obfuscation
Home Computers & Technology Technology
By: Jose Sogiros Email Article
Word Count: 501 Digg it | it | Google it | StumbleUpon it


The intellectual property value of computer software for companies is hard to meter, but it is without doubt an extremely precious business resource. In fact, the produced software makes up the supreme asset for every organisation that develops and sells computer software. Accordingly, reversing and the theft of sections and functions of software packages can be more cataclysmal to the society than the thievery of any singular physical feature.

A achievable means to prohibit hacking is to interdict physical admission to the program via use of a client-server model. This variety of protection is reasonably secure. Regrettably, it sets up performance penalties because of latency and more distinctive network restrictions. Code crypting is also a valid possibility in program protection though also this technique leaves vulnerabilities unless all encrypting and decrypting is wholly executed inside hardware. And because special hardware restricts the portability of programs, some other technique - named code obfuscation - is often seen as the firmer answer.

In the most generic sense, code obfuscation entails transformation into a harder variety to understand - for humans - than the primary code. Typically, it entails that the obfuscated computer program requires more effort to dissect than the original. Obviously, the intention is to make affairs more involving for unaccredited individuals only, so, coders obfuscate as a very last stage in the development.

Altogether, code obfuscation wishes to make hacking really expensive in terms of resources and/or time. It can not offer infinite protection but it is portable and does not demand specialistic hardware. Either way, it ordinarily brings a strong place and time carrying out punishment.

Depending on the format in which the computer software is developed, different kinds of code obfuscation can be practiced. In those examples where the source code of a computer program is distributed, source code obfuscation is oftentimes practiced. Bytecode obfuscation is practiced on Java bytecode or MS .NET, binary code obfuscation can be practiced to all applications compiled into native code.

There is a steeper menace of plagiarism in computing environments like Java Bytecode and Microsoft dotnet. Their just in time compiling leaves the code on disk as intermediate code, which is simple to decompile into the original source code, therefore significantly raising the risks.

Thus far about source code obfuscation proficiencies.

Binary code obfuscation proficiencies transmutate code at binary point, hence in the compiled executable. In approaches against computer software, plagiarism of executables by disassembling and debugging to retrieve the searched for information, represents an essential role. That's why dynamic code obfuscation is applied to change the binary code continuously at runtime. It helps in preventing correct static disassembly. Unluckily, what is strong for the one could also be utilised by the competitor, is also accurate for code obfuscation, and today, dynamic obfuscation techniques offer - on the fly - malevolent web sites the ways to make different instances of obfuscated malevolent programs. It necessitates an enormous quantity of knowledge and research for anti malware creators, to fend off onslaughts by such always transmutating malware.

Jose Sogiros is a veteran developer in the anti hacking program business making smart developer applications to assist develop firmer software anti hacking programs.

Article Source:

This article has been viewed 373 times.

Rate Article
Rating: 0 / 5 stars - 0 vote(s).

Article Comments
There are no comments for this article.

Leave A Reply
 Your Name
 Your Email Address [will not be published]
 Your Website [optional]
 What is nine + five? [tell us you're human]
Notify me of followup comments via email

Related Articles

Copyright © 2018 by All rights reserved.

Terms of Service | Privacy Policy | Contact Us | Submit Article | Editorial