NoLoader
October 26th, 2007, 09:49
Hi All,
I ran across some interesting reading, and wanted to share the result. The results have been known for quite some time, but I finally found references for the opinion.
"... there do not exist any techniques for preventing attacks by
reverse engineering stronger than by what is afforded by obscuring the
purpose of the code" [1].
And
"even under very weak formalizations [sic: the formal mathematical
construction of obfuscation], obfuscation is impossible" [2].
Jeff
[1] C. Collberg and C. Thomborson, Watermarking, Tamper-Proofing, and
Obfuscation - Tools for Software Protection, p. 5, IEEE Transactions
On Software Engineering, Volume 28, No. 8, August 2002.
[2] B. Barak, et. al., On the (Im)possibility of Obfuscating Programs,
http://www.eecs.harvard.edu/~salil/papers/obfuscate.ps, August 15,
2001.
I ran across some interesting reading, and wanted to share the result. The results have been known for quite some time, but I finally found references for the opinion.
"... there do not exist any techniques for preventing attacks by
reverse engineering stronger than by what is afforded by obscuring the
purpose of the code" [1].
And
"even under very weak formalizations [sic: the formal mathematical
construction of obfuscation], obfuscation is impossible" [2].
Jeff
[1] C. Collberg and C. Thomborson, Watermarking, Tamper-Proofing, and
Obfuscation - Tools for Software Protection, p. 5, IEEE Transactions
On Software Engineering, Volume 28, No. 8, August 2002.
[2] B. Barak, et. al., On the (Im)possibility of Obfuscating Programs,
http://www.eecs.harvard.edu/~salil/papers/obfuscate.ps, August 15,
2001.