Skip to main content

All Questions

2votes
4answers
1kviews

Code obfuscation and source code repositories

As I understand, code obfuscation is used to make reverse engineering difficult/hard for the adversaries/red team. Now if I use a source code obfuscator where a .C/.CPP file is used as input and an ...
Baranikumar Venkatesan's user avatar
2votes
1answer
2kviews

Is using IsBadReadPtr and IsBadWritePtr considered to be insecure?

I am auditing (reverse engineering) an x86 C++ application without source code. Static analysis revealed that the application is using the IsBadReadPtr and IsBadWritePtr Win32 functions in almost ALL ...
madmax25's user avatar
27votes
2answers
4kviews

Identifying the author(s) of a piece of malware

When a new piece of malware appears, people can try to determine where it comes from, and who its authors could be. How do security experts attempt to identify the authors of a new publicly disclosed ...
user3404735's user avatar
4votes
1answer
502views

How could a publicly available stream cipher (RC4) be kept secret so long?

I'm reading about the cryptographic function called RC4. Apparently, its method was kept secret from 1987 until 1994 despite being available to the public for licensing and use. How did it stay ...
CodyBugstein's user avatar
46votes
15answers
12kviews

Should we protect web application source code from being stolen by web hosts through obfuscation?

Is it worth to obfuscate a java web app source code so that the web host cannot make wrong use of the code or even steal your business? If so, how should this be dealt with? How should we obfuscate? ...
Rajat Gupta's user avatar

close