Software Protection Versus Code Obfuscation - Stable Software Protection
- Date: 2010-05-06 - Word Count: 560
Share This!
Security of intellectual property is crucial for every business in today's modern reality. Competitive vantage is attained through technological finds but thievery of applications and/or algorithms can leave the rival a dominant situation over his contenders. Consequently, piracy and the theft of pieces and subroutines of computer software can be more wasting to the society than the theft of any singular natural asset. Few mechanisms can be utilised to foreclose plagiarism in a relatively secure way. An illustration is server-side execution of programs, another is encoding where the integral decryption/execution routine happens in specific computer hardware. Those options both put up sound protection versus reversing since the cracker sustains a strong problem reaching the code. Still, there are some essential downsides to these methods because server-side execution performs worse than if executed locally and hardware execution necessitates the end user to have special hardware.
There are more protection alternatives obtainable though, one of which is code obfuscation but code obfuscation is rather a style of making reversing economically undoable in terms of time and resources necessitated. Sure, there are conditions compulsory to the applied code obfuscation technique. For illustration, the practiced proficiencies must be capable to ward off approaches with deobfuscator tools. Code obfuscation is producing software code deliberately tricky to understand, whichs can be done in various ways, such as applying encryption and by adding random comments and variable names. Manifestly, the primary argue why someone practices code obfuscation is to prohibit piracy of the program. A painful fallout of obfuscating transmutations is oft a larger and slower resulting computer program. Hence, the programmer is expected to make sure the gain in protection is worth this extra operating cost.
Code obfuscation techniques can be divided in three families, with a matching mapping between the transformation type and the obfuscation type. This means that source code obfuscation makes transmutations to the source code and bytecode obfuscation to the bytecode. Accordingly, binary obfuscation executes its modifications to the binary code.
Generally, it has been sort of difficult to reverse computer software that were compiled into native code, but since the coming up of dotnet and Java, the risk of piracy has increased in the same way. A good deal of the info contained in the source code stays on in the intermediate language or the bytecode, it eases decompilation whilst raising the danger of cracking. Programing in a language not so susceptible to decompilation may seem like a good approximation because native object coding renders decompilation a lot more challenging to accomplish, althoughit is not totally unattainable.
Binary code obfuscation is sometimes also mentioned to as code morphing because it obfuscates the machine language or object code rather than source code. Binary code obfuscation techniques transform code at binary level, so in the compiled executable. It makes disassembling, debugging and decompiling of a distributed software much more tricky. Yet, by appending superfluous and/or difficult functioning and complementary code, the execution time of the software is increased. For that cause, binary code obfuscation is ordinarily limited to 'sensitive pieces' of a software only.
Still, code obfuscation could also help a different lord and it is implemented to shield a society's intellectual property from plagiarism and theft. But, it is also employed to hide malevolent code, thus bringing hard times for safety analysts in discovering the malicious payload of particular "varieties" of applications.
There are more protection alternatives obtainable though, one of which is code obfuscation but code obfuscation is rather a style of making reversing economically undoable in terms of time and resources necessitated. Sure, there are conditions compulsory to the applied code obfuscation technique. For illustration, the practiced proficiencies must be capable to ward off approaches with deobfuscator tools. Code obfuscation is producing software code deliberately tricky to understand, whichs can be done in various ways, such as applying encryption and by adding random comments and variable names. Manifestly, the primary argue why someone practices code obfuscation is to prohibit piracy of the program. A painful fallout of obfuscating transmutations is oft a larger and slower resulting computer program. Hence, the programmer is expected to make sure the gain in protection is worth this extra operating cost.
Code obfuscation techniques can be divided in three families, with a matching mapping between the transformation type and the obfuscation type. This means that source code obfuscation makes transmutations to the source code and bytecode obfuscation to the bytecode. Accordingly, binary obfuscation executes its modifications to the binary code.
Generally, it has been sort of difficult to reverse computer software that were compiled into native code, but since the coming up of dotnet and Java, the risk of piracy has increased in the same way. A good deal of the info contained in the source code stays on in the intermediate language or the bytecode, it eases decompilation whilst raising the danger of cracking. Programing in a language not so susceptible to decompilation may seem like a good approximation because native object coding renders decompilation a lot more challenging to accomplish, althoughit is not totally unattainable.
Binary code obfuscation is sometimes also mentioned to as code morphing because it obfuscates the machine language or object code rather than source code. Binary code obfuscation techniques transform code at binary level, so in the compiled executable. It makes disassembling, debugging and decompiling of a distributed software much more tricky. Yet, by appending superfluous and/or difficult functioning and complementary code, the execution time of the software is increased. For that cause, binary code obfuscation is ordinarily limited to 'sensitive pieces' of a software only.
Still, code obfuscation could also help a different lord and it is implemented to shield a society's intellectual property from plagiarism and theft. But, it is also employed to hide malevolent code, thus bringing hard times for safety analysts in discovering the malicious payload of particular "varieties" of applications.
Related Tags: protection, security, software protection, security software
Your Article Search Directory : Find in Articles
Recent articles in this category:
- What Is Spyware?
If you use a computer then there are certain things that you have to be educated about. Spyware is o - There's No Such Thing As The Perfect Password
Even though you can get advice on how to create the perfect password, it's important to realize that - Shopping Online For Contacts: Security And Privacy
The Fairness to Contact Lens Consumer Act, signed into law in 2004, empowered lens wearers with the - Step-by-step Procedure Of Ssl Certificate Installation
SSL certificates are used to transfer the private data entered on the user computer to the website o - Portable Mini Digital Video Recorder
Portable Mini Digital Video Recorder is one of the world's smallest high-resolution mini Digital Vid - Protecting Domain Name From Cyber Squatting And Hijacking
Before I go into details about protecting domain name you should first know that there is no busines - Finding Email Senders Using Reverse Email Lookup
Most of our email inboxes are flooded with so many solicited and unsolicited messages that it's ofte - Confidentiality With Secure Email
Confidentiality, in any business, is among the most significant key in order to keep a client. There - Covering Your Computer's Footprints
When you delete a file, email, or piece of internet history on your computer, where do you think it - Email Theft: 5 Things You Should Look For
You've probably seen an email from a Nigerian prince saying how he needs help and how he needs you t
Most viewed articles in this category:
- How Does Ssl Fit Into the Over Scheme of Internet Security?
Internet has become an integral part of our life. Most of us prefer to do maximum amount of transact - Tips of Security
Protecting private information Information is the lifeblood of most, if not all, modern organis - Your Security Awareness Iq
Article about security awareness: Are you aware of the need for security? Your awareness o - Information Security Endangered
Sour time is coming. Spy programs are stealing information more easily. The reason is weak algorithm - Internet Attack Methods
The U.S. Government's National Information Assurance Glossary defines Information Security as: Prote - Computer Viruses
In information security , computer virus is a manmade program or piece of code that is loaded onto y - The Top 7 Threats to your Computer in 2007
Now that the holidays are behind us, the cost-conscious among us will be looking for those "post-hol - In Reality, Spyware is Always a Threat
I received a spam email the other day and the subject said "Tired of reality shows? Make your ow - Security Using Public Internet Array Access
Internet comes to peoples lives and then suddenly comes truth, that WE CAN'T LIVE WITHOUT INTERNET. - Anti-virus Software Comparison Test
Virus.gr tested quite a few different software companies to see how they would stack up against each