Presentation is loading. Please wait.

Presentation is loading. Please wait.

Reverse Engineering v/s Secure Coding.. What is Secure Coding? Is Secure Coding simply avoiding certain already discovered vulnerable functions? Is Secure.

Similar presentations


Presentation on theme: "Reverse Engineering v/s Secure Coding.. What is Secure Coding? Is Secure Coding simply avoiding certain already discovered vulnerable functions? Is Secure."— Presentation transcript:

1 Reverse Engineering v/s Secure Coding.

2 What is Secure Coding? Is Secure Coding simply avoiding certain already discovered vulnerable functions? Is Secure Coding simply avoiding certain already discovered vulnerable functions? What about Tons of Commercial applications that are released everyday? What about Tons of Commercial applications that are released everyday? Software Crackers (Reverse Engineers) causing Millions of Dollars of loss Globally due to Software Piracy. Software Crackers (Reverse Engineers) causing Millions of Dollars of loss Globally due to Software Piracy. Are you Programmers taking your Job seriously? Are you Programmers taking your Job seriously?

3 Cryptography?...Hmm… Cryptography in Application Registration routines don’t make sense. Cryptography in Application Registration routines don’t make sense. Cryptographic Algorithm adds to the applications’ size & is Processor intense. Cryptographic Algorithm adds to the applications’ size & is Processor intense. Cryptographic Algorithm in Registration routines can be either completely ripped off or totally bypassed and they pose no challenge to a Cracker. Cryptographic Algorithm in Registration routines can be either completely ripped off or totally bypassed and they pose no challenge to a Cracker.

4 Packers & Protectors? What are Packers? What are Packers? What are Protectors? What are Protectors? Packers make Sense but Protectors don’t ! Packers make Sense but Protectors don’t ! Packers == very easy to defeat. Packers == very easy to defeat. Protectors == who cares to defeat ? Protectors == who cares to defeat ? Virtual Machines?.... Not again! Virtual Machines?.... Not again!

5 .Net & Java == Not Cool? Decompilation & not Disassembling. Decompilation & not Disassembling..Net is M$’s take on Java..Net is M$’s take on Java..class files &.net executables rely heavily on Runtime Environment Components..class files &.net executables rely heavily on Runtime Environment Components. Damn easy to break code and Damn tough to prevent us from Tampering with your App. Damn easy to break code and Damn tough to prevent us from Tampering with your App.

6 Mobile Devices…. Yeah! Sony Ericsson’s “.Sest” Feature talked about for the first time ever! Sony Ericsson’s “.Sest” Feature talked about for the first time ever! J2me applications built for Mobile Devices should be “Freewares”. J2me applications built for Mobile Devices should be “Freewares”. J2me Trojans can be very easy to code. J2me Trojans can be very easy to code. Don’t even want to talk about Sony Ericsson & Siemens’ “Phone Modding”. Don’t even want to talk about Sony Ericsson & Siemens’ “Phone Modding”.

7 Can I Tackle R.E ? Technically Speaking? No you Can’t! Technically Speaking? No you Can’t! Logically ? Bore us to Death! Logically ? Bore us to Death! How? How? a] Use spaghetti Code. a] Use spaghetti Code. b] Jump all over the Place. b] Jump all over the Place. c] Learn Polymorphism. c] Learn Polymorphism. d] Learn to use your “Imagination” as a tool. d] Learn to use your “Imagination” as a tool. e] Think like a Reverse Engineer! e] Think like a Reverse Engineer!

8 “Thinking Before Writing, saves the time spent in Editing.” –Pirated. Thank You. Atul Alex Cherian, www.OrchidSeven.comwww.OrchidSeven.com. www.OrchidSeven.comPh:9860056788. Atul.alex@orchidseven.com


Download ppt "Reverse Engineering v/s Secure Coding.. What is Secure Coding? Is Secure Coding simply avoiding certain already discovered vulnerable functions? Is Secure."

Similar presentations


Ads by Google