Hi, Ken,

This morning, an article caught my attention -- "Managing the insider threat through code obfuscation", http://www.itmanagersjournal.com/article.pl?sid=05/12/13/1736253

The article's premise is that, because attackers can find out a great deal about the internals of databases and such by decompiling bytecode (in Java and .NET), bytecode should be obfuscated to hide its internal details. The article points to several commercial bytecode obfuscation products: http://www.devdirect.com/ALL/OBFUSCATIORS_PCAT_2014.aspx

I heard about code obfuscation in the late 1970's. A friend (and fellow student) in my graduate program said a company he worked at did exactly that. But the goal was *not* security; it was copyright protection. If anyone copied their binary, and claimed to have written it independently (and so did not need to pay a licensing fee), the company could easily prove to a court that the other user had not written it on their own by showing the convoluted logic in the program.

I don't remember if he said they ever actually had to do this in court, but it seemed a pretty effective way to trace code lineage. The application was not one in which speed was critical, so the loss of speed due to the obfuscation was apparently tolerable (if not unnoticeable).

I don't remember the language involved, but suspect pretty strongly it was *not* Java, because our discussion was some 15-20 years before Java was released ... :-)

Cheers to all!

Matt
_______________________________________________
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php

Reply via email to