obfuscation

Obfuscation and GPL

This is a hypothetical scenario (ie: I just thought it up and I do not intend to do it!) What stops a company from preventing the effective use of a derivative GPL work by doing the following Fork the GPL project Make a derivative work Sell the derivative work and publish the source code in obfuscated form So technicly they have rel...

Obfuscating method with throws clause

I'm using ProGuard to obfuscate my code. My project is comprised of a few modules, each obfuscated independently. One library includes an interface; public interface IFace { public int methodA(boolean b) throws CustomException; } Another library provides an implmentation public class IFaceImpl implements IFace { @Override ...

JCE Pro - Any good?

Hi Guys, I was wondering if anyone has had any valid experience with JCE Pro ? http://www.syntropy.se - javascript obfuscation Or any other good obfuscation methods for that reason ? ...

(Rails) Protecting code and licensing for independently deployed Rails applications...?

Hi All, I'm writing a Rails application which will have reasonably regular updates -- nothing abnormal here. I face a problem, however, due to the distribution model. Basically the application will be sold for stand-alone "intranet" installation due to its "add-on" nature (it's basically a web interface for an existing, database-drive...

Distribute a application to the public so they can compile, without revealing the source

I have a proprietary application I would like to hand out to a few people for testing, except we do not want to reveal the source to them. The application is written in C++ for Linux. It links against readily available packages on the Fedora/Ubuntu repos. Is there any way to process the source to something intermediate... then distribu...

Is obfuscation the best answer

Possible Duplicates: How effective is obfuscation? Protect ASP.NET Source code (Why) should I use obfuscation? Is obfuscation the best answer for protecting our code ? *Specially in Web Projects when you want to deliver your web projects as libraries of code to your customer ( the person who ordered ) * Edited At firs...

Are there any examples of code that is difficult to decompile?

Sometimes when decompiling Java code, the decompiler doesn't manage to decompile it properly and you end up with little bits of bytecode in the output. What are the weaknesses of decompilers? Are there any examples of Java source code that compiles into difficult-to-decompile bytecode? Update: Note that I'm aware that exploiting this ...

Real world uses for obfuscation

For what purposes would you want to obfuscate your code? I have not run into any real purposes other than participating in contests, but I am sure there must be some intelligent and useful reasons for obfuscating source code. Why, in general, do you want or need to obfuscate your code? What real-life applications does obfuscation hav...

how to write code in asp.net to stop reverse engineering of asp.net application.

We are having an application that is downloadable. We want to stop the application being reverse engineered by someone to lose our business. It there any way to stop this? ...

Babel Obfuscator crash

hi, currently i try to use the Babel Obfuscator. my options are --not --nostringencrypt --ildasm but an appcrash(babel) is the result. my project is a WPF(.net 3.5) project - size 1029kb. Description: Stopped working Problem signature: Problem Event Name: APPCRASH Application Name: babel.exe Application Version: 1.5.0.0 ...

Show us your best obfuscated identity function

Rules are simple. Write an obfuscated function in any language that takes in an integer and returns the same integer. Try to use math tricks and not language tricks. IE. Try to make your function portable. ...

Clever way to make same assembly executed differently?

Without changing the build process or including the source files, can anyone think of a way to make two pieces of code that, when compiled, generates the same assembly but still executes differently? I already know why this should be impossible, so please don't bother to explain. There are definitely ways to do it, primarily by finding ...

How do I replace multiple words, each hashed to an alternate word, in a HTML attribute using Perl regex?

I'm writing an HTML obfuscator, and I have a hash correlating user-friendly names (of ids and classes) to obfuscated names (like a,b,c,etc). I'm having trouble coming up with a regexp for accomplishing replacing something like <div class="left tall"> with <div class="a b"> If tags could only accept one class, the regexp would simpl...

DLL Protection - Hide methods and variables from other people.

Possible Duplicate: How to protect dlls? I am wondering how I may protect my DLL files from being used by other people. By "used" I mean, referenced/imported or whatever into projects and the functions and variables inside used. I only wish it to be used by my applications... is there a way to protect it? ...

Do you know any good actionscript / flex 3 obfuscators?

Now I do know that obfuscation is never 100% safe, but it's better than nothing when attempting to avoid others from decompiling your .swf files. I googled and found one which only changed variable names and removed comments. I need something more advanced. Any recommendations? ...

Does e-mail obfuscation really make automatic harvesting harder?

Many users and forum programs in attempt to make automatic e-mail address harversting harder conseal them via obfuscation - @ is replaced with "at" and . is replaced with "dot", so [email protected] now becomes team at stackoverflow dot com I'm not an expert in regular expressions and I'm really curious - does such obfuscatio...

Any reverse engineers have experience with secureSWF?

I'm writing a flash application and am afraid that it will be decompiled. In order to minimize this chance, I want to obfuscate the file. I have heard of secureSWF (http://www.kindisoft.com/), and they do list some "user comments". These are however so optimistic that they are hard to trust. There's not a single pessimistic comment (not...

How does Dotfuscator work? [c#]

How does Dotfuscator work? I tried obfuscate some of my classes and it renamed the methods/class to a, b, c etc. But I can still see the code inside those methods? Is it that, I am doing something wrong? Is there anything that would prevent a totally block deassembling my assembly? ...

Questions about .NET and Xenocode Postbuild

Referring to this topic (and accepted answer). Isn't .NET Windows only (except for emulators)? How will using Xenocode Postbuild affect the portability of the application? Will compiling my application using Xenocode Postbuild affect the size/speed of it? Which way? Generally: What are the differences/advantages/disadvantages of the VS...

Is it possible to run dotfuscator from command line without opening GUI application.

i am looking for obfuscator tool to secure the assembly. and i need to do reverse enginnering on that obfuscated assembly to invoke methods. right now i tried with dotfuscator tool which is integrated with VS 2005,2008. and i follow following steps. 1. Make obfuscated assembly using GUI tool. 2. Import in reflector. 3. i am able to see ...