From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.3 required=5.0 tests=BAYES_00,INVALID_MSGID autolearn=no autolearn_force=no version=3.4.4 X-Google-Language: ENGLISH,ASCII-7-bit X-Google-Thread: ff6c8,12f4d07c572005e3 X-Google-Attributes: gidff6c8,public X-Google-Thread: 1108a1,12f4d07c572005e3 X-Google-Attributes: gid1108a1,public X-Google-Thread: 10db24,12f4d07c572005e3 X-Google-Attributes: gid10db24,public X-Google-Thread: f43e6,12f4d07c572005e3 X-Google-Attributes: gidf43e6,public X-Google-Thread: 103376,12f4d07c572005e3 X-Google-Attributes: gid103376,public From: dewar@cs.nyu.edu (Robert Dewar) Subject: Re: Ada News Brief - 96-05-24.txt [1/1] Date: 1996/06/01 Message-ID: #1/1 X-Deja-AN: 157934071 references: <4o56db$p66@ns1.sw-eng.falls-church.va.us> organization: Courant Institute of Mathematical Sciences newsgroups: comp.lang.ada,comp.sw.components,comp.object,comp.software-eng,comp.edu Date: 1996-06-01T00:00:00+00:00 List-Id: Richard asks " Will JBC be secure enough to prevent someone from using it to reverse engineer my software product?" The answer is definitely NO! But it is also the case that machine language is easy enough to reengineer or reverse engineer if you want to. If you want to take a commercial program for the PC, and spend the time, there are powerful disassembly and analysis tools available that will enable you to do this reverse engineering, no matter HOW much attempt has been made to obfuscate (in extreme cases, you will need logic analyzers and in-circuit emulators, but this is all very accessible and very practical technology). Almost anyone working at a low level on PC's has had to spend time reverse engineering parts of DOS for instance to understand what was going on, and as an example, take a look at the (perfectly atrocious) ruling against Stacker in the Microsoft-Stacker case (I am talking about the counter award, not the main award in the other direction).