Actions

Difference between revisions of "Application Obfuscation"

(Application obfuscation refers to a set of technologies used to protect an application and its embedded intellectual property (IP) from application-level intrusions, reverse engineering and hacking attempts.)
 
m (The LinkTitles extension automatically added links to existing pages (https://github.com/bovender/LinkTitles).)
Line 1: Line 1:
Application obfuscation refers to a set of technologies used to protect an application and its embedded intellectual property (IP) from application-level intrusions, reverse engineering and hacking attempts. Application obfuscation tools protect the application code as the increasing use of intermediate language representations (such as Java and .NET) enables hackers to easily reverse-engineer IP embedded in software.<ref>What is Application Obfuscation? [http://www.gartner.com/it-glossary/application-obfuscation Gartner]</ref>
+
[[Application]] obfuscation refers to a set of technologies used to protect an application and its embedded intellectual property (IP) from application-level intrusions, reverse engineering and hacking attempts. Application obfuscation tools protect the application code as the increasing use of intermediate language representations (such as Java and .NET) enables hackers to easily reverse-engineer IP embedded in [[software]].<ref>What is Application Obfuscation? [http://www.gartner.com/it-glossary/application-obfuscation Gartner]</ref>
  
  
 
'''Should I Obfuscate and Secure my Application?'''<ref>Should I Obfuscate and Secure my Application? [https://www.preemptive.com/obfuscation PreEmptive Solutions]</ref><br />
 
'''Should I Obfuscate and Secure my Application?'''<ref>Should I Obfuscate and Secure my Application? [https://www.preemptive.com/obfuscation PreEmptive Solutions]</ref><br />
If you are releasing valuable software (especially Java, Android, .NET and iOS) anywhere outside your immediate control and you are not distributing the source code, obfuscation should probably be part of your application development process. Obfuscation makes it much more difficult for attackers to review the code and analyze the application. It also may make it hard for hackers to debug and tamper with your application. The end goal is to make it difficult to extract or discover useful information, such as trade secrets (IP), credentials, or security vulnerabilities from an application. It should also make it more difficult to modify application logic or repackage an application with malicious code.
+
If you are releasing valuable software (especially Java, Android, .NET and iOS) anywhere outside your immediate [[control]] and you are not distributing the source code, obfuscation should probably be part of your application development [[process]]. Obfuscation makes it much more difficult for attackers to review the code and analyze the application. It also may make it hard for hackers to debug and tamper with your application. The end goal is to make it difficult to extract or discover useful information, such as trade secrets (IP), credentials, or security vulnerabilities from an application. It should also make it more difficult to modify application logic or repackage an application with malicious code.
  
  

Revision as of 13:46, 6 February 2021

Application obfuscation refers to a set of technologies used to protect an application and its embedded intellectual property (IP) from application-level intrusions, reverse engineering and hacking attempts. Application obfuscation tools protect the application code as the increasing use of intermediate language representations (such as Java and .NET) enables hackers to easily reverse-engineer IP embedded in software.[1]


Should I Obfuscate and Secure my Application?[2]
If you are releasing valuable software (especially Java, Android, .NET and iOS) anywhere outside your immediate control and you are not distributing the source code, obfuscation should probably be part of your application development process. Obfuscation makes it much more difficult for attackers to review the code and analyze the application. It also may make it hard for hackers to debug and tamper with your application. The end goal is to make it difficult to extract or discover useful information, such as trade secrets (IP), credentials, or security vulnerabilities from an application. It should also make it more difficult to modify application logic or repackage an application with malicious code.


References

  1. What is Application Obfuscation? Gartner
  2. Should I Obfuscate and Secure my Application? PreEmptive Solutions


Further Reading