Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Interesting Read - Obfuscation is Dead. Long live Obfuscation

Interesting Read - Obfuscation is Dead. Long live Obfuscation

Scheduled Pinned Locked Moved The Lounge
csharp
19 Posts 15 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • realJSOPR realJSOP

    http://jcooney.net/post/2010/06/06/The-sad-(but-inevitable)-state-of-NET-Obfuscation.aspx[^]

    ".45 ACP - because shooting twice is just silly" - JSOP, 2010
    -----
    You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010
    -----
    "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass." - Dale Earnhardt, 1997

    M Offline
    M Offline
    Mark_Wallace
    wrote on last edited by
    #9

    I have yet to come across an argument that convinces me that the value achieved from obfuscation in any way outweighs the effort and extra resources required to implement it.

    I wanna be a eunuchs developer! Pass me a bread knife!

    1 Reply Last reply
    0
    • realJSOPR realJSOP

      http://jcooney.net/post/2010/06/06/The-sad-(but-inevitable)-state-of-NET-Obfuscation.aspx[^]

      ".45 ACP - because shooting twice is just silly" - JSOP, 2010
      -----
      You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010
      -----
      "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass." - Dale Earnhardt, 1997

      M Offline
      M Offline
      Michael Kingsford Gray
      wrote on last edited by
      #10

      Obfuscation is like a locked door. It deters casual snoopers and juvenile vandals, but not professional burglars.

      1 Reply Last reply
      0
      • realJSOPR realJSOP

        http://jcooney.net/post/2010/06/06/The-sad-(but-inevitable)-state-of-NET-Obfuscation.aspx[^]

        ".45 ACP - because shooting twice is just silly" - JSOP, 2010
        -----
        You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010
        -----
        "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass." - Dale Earnhardt, 1997

        F Offline
        F Offline
        Fabio Franco
        wrote on last edited by
        #11

        Reverse engineering was never limited to .net assemblies. Native code binaries have always been reverse engineered. Obfuscation helps making reverse engineering closer in difficulty to native code binaries. It can avoid the less hardcore crackers to get sensitive information or steal code. But no binary (native or IL) can avoid beeing reverse engineered. This is as much true as the few days it takes after a game beeing released to a crack be available. Does it mean I should not obfuscate my application? It depends. If I'm just trying to avoid my client's employee from cracking the encryption key, it might be well worth it. But it all depends on case, I don't beleive obfuscation is simply dismissable.

        1 Reply Last reply
        0
        • P Pete OHanlon

          We only do obfuscation because our clients demand it.

          I'm not a stalker, I just know things. Oh by the way, you're out of milk.

          Forgive your enemies - it messes with their heads

          My blog | My articles | MoXAML PowerToys | Onyx

          F Offline
          F Offline
          Fabio Franco
          wrote on last edited by
          #12

          Perhaps they have a reason for it. I beleive obfuscation is a case by case analysis. See my reply...

          1 Reply Last reply
          0
          • realJSOPR realJSOP

            http://jcooney.net/post/2010/06/06/The-sad-(but-inevitable)-state-of-NET-Obfuscation.aspx[^]

            ".45 ACP - because shooting twice is just silly" - JSOP, 2010
            -----
            You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010
            -----
            "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass." - Dale Earnhardt, 1997

            P Offline
            P Offline
            peterchen
            wrote on last edited by
            #13

            I can imagine a few less dubious uses. The one thing surprising for me is that it can be done with a generic tool. Hats off! There's probably a lot of code out there that could benefit from that before obfuscation.

            Agh! Reality! My Archnemesis![^]
            | FoldWithUs! | sighist | WhoIncludes - Analyzing C++ include file hierarchy

            D 1 Reply Last reply
            0
            • P peterchen

              I can imagine a few less dubious uses. The one thing surprising for me is that it can be done with a generic tool. Hats off! There's probably a lot of code out there that could benefit from that before obfuscation.

              Agh! Reality! My Archnemesis![^]
              | FoldWithUs! | sighist | WhoIncludes - Analyzing C++ include file hierarchy

              D Offline
              D Offline
              Dan Suthar
              wrote on last edited by
              #14

              :sigh: this is how computers are designed ! And still IT industry earns a lot from softwares ! Perhaps laws make them buy legal one ! But i think msft should do something , even a little do make .NET exes safe from usual crackers ! :-\

              P 1 Reply Last reply
              0
              • D Dan Suthar

                :sigh: this is how computers are designed ! And still IT industry earns a lot from softwares ! Perhaps laws make them buy legal one ! But i think msft should do something , even a little do make .NET exes safe from usual crackers ! :-\

                P Offline
                P Offline
                peterchen
                wrote on last edited by
                #15

                Dan Suthar wrote:

                this is how computers are designed!

                This has nothing to do with computers, but (meta-)algorithms for analysis and transformation of algorithms. For sure, opportunities for obfuscation are limited. Still, a "generic tool" means that every equivalent implementation of an algorithm can be automatically transformed into a "readable" one. That's certainly a feat.

                Agh! Reality! My Archnemesis![^]
                | FoldWithUs! | sighist | WhoIncludes - Analyzing C++ include file hierarchy

                J 1 Reply Last reply
                0
                • N Nemanja Trifunovic

                  IMHO, people are expecting too much when it comes to obfuscation. Yes, it may be useful to deter a casual amateur hacker from reverse-engineering an application, but that's it. If a skilled and determined person wants to see the internals of an application, they will eventually attach a debugger to it and see the assembly code - there is nothing you can do to prevent it if you are shipping binaries to customers.

                  utf8-cpp

                  M Offline
                  M Offline
                  Member 96
                  wrote on last edited by
                  #16

                  Nemanja Trifunovic wrote:

                  IMHO, people are expecting too much when it comes to obfuscation.

                  I think this is a commonly held misconception. I would be utterly surprised if there was anyone using an obfuscator in a commercial app who really thought that it was bulletproof. On the contrary I think those of us using obfuscation know it's limitations and use them accordingly.


                  There is no failure only feedback

                  1 Reply Last reply
                  0
                  • realJSOPR realJSOP

                    http://jcooney.net/post/2010/06/06/The-sad-(but-inevitable)-state-of-NET-Obfuscation.aspx[^]

                    ".45 ACP - because shooting twice is just silly" - JSOP, 2010
                    -----
                    You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010
                    -----
                    "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass." - Dale Earnhardt, 1997

                    M Offline
                    M Offline
                    Member 96
                    wrote on last edited by
                    #17

                    People seem to think that because it's easy to de-obfuscate that it's crazy to obfuscate in the first place. This is just plain wrong. For example it's easy to break into a vehicle, any one of us could do it, does that mean none of us should ever lock our doors? It's all a matter of degrees, obviously nothing is going to stop a career criminal, but it will certainly keep honest people honest. It's a form of insurance and peace of mind and it's cheap and easy to do and I guarantee you that for a large complex app it's more work to recreate a working app from a properly obfuscated copy than it is to simply write it over again from scratch. That's all I care about, that and semi protection of our licensing code. Beyond that I doubt there are really any truly new ground breaking algorithms in computer science that need protecting, despite all the patent claims to the contrary.


                    There is no failure only feedback

                    1 Reply Last reply
                    0
                    • realJSOPR realJSOP

                      http://jcooney.net/post/2010/06/06/The-sad-(but-inevitable)-state-of-NET-Obfuscation.aspx[^]

                      ".45 ACP - because shooting twice is just silly" - JSOP, 2010
                      -----
                      You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010
                      -----
                      "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass." - Dale Earnhardt, 1997

                      J Offline
                      J Offline
                      Joe Simes
                      wrote on last edited by
                      #18

                      I obfuscate my code to keep my customers from seeing what a hack I really am! :-D

                      1 Reply Last reply
                      0
                      • P peterchen

                        Dan Suthar wrote:

                        this is how computers are designed!

                        This has nothing to do with computers, but (meta-)algorithms for analysis and transformation of algorithms. For sure, opportunities for obfuscation are limited. Still, a "generic tool" means that every equivalent implementation of an algorithm can be automatically transformed into a "readable" one. That's certainly a feat.

                        Agh! Reality! My Archnemesis![^]
                        | FoldWithUs! | sighist | WhoIncludes - Analyzing C++ include file hierarchy

                        J Offline
                        J Offline
                        James Lonero
                        wrote on last edited by
                        #19

                        If you're trying to protect algorithms, then try patenting. They are good legal protection.

                        1 Reply Last reply
                        0
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Don't have an account? Register

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups