August 5th, 2013 | By Jscrambler | 1 min read
To start, we’d like to share with you a presentation we did recently at the OWASP Europe Tour 2013 in Lisbon. In this presentation, our CTO, Pedro Fortuna, explains the basic concepts around source code obfuscation.
Metrics such as obfuscation potency, resilience, stealthiness, execution cost, and maintainability are deeply explained. Simple examples are provided to better understand these metrics.
Is all dead code injection defeated with a static code analyzer and therefore pointless?
Code obfuscation aims to delay the understanding of what a program does. It can be used, for example, in scenarios where the code contains Intellectual Property (algorithms) or when the owner wants to prevent a competitor from stealing and reusing the code.
That said, obfuscation transformation translates easy-to-understand code into a much harder-to-understand form.
Must read next
Can ChatGPT reverse engineer Jscrambler obfuscation?
As the potential of ChatGPT (and of Generative AI in general) is unveiled, experts and developers keep asking questions and experimenting with the tool. Can it crack even the strongest protections...
June 13, 2023 | By Jscrambler | 6 min read
July 25, 2023 | By Jscrambler | 18 min read