Can someone take linux C++ binary to break into individual objects or components?

Posted on 2004-04-01
Last Modified: 2013-11-15
Hi Guru:

Can someone take linux C++'s binary file and break into individual objects or components with same object name or different object name?

I am asking the questions since one company ask us to give them binary file. If they can break the binary into objects, it is easy for them to reverse engineer our code since. Please let me know if you already have the answers. Thanks.
Question by:http29
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
LVL 44

Accepted Solution

Karl Heinz Kremer earned 100 total points
ID: 10736263
You can - with a good disassembler and a huge amount of time - reverse engineer any executable, but this has nothing to do with potentially splitting an executable into the original object files.
I suspect that this can be done with a lot of effort, but again, it would not make any difference if you are dealing with the complete executable, or the individual object files. The effort to reverse engineer these two would be the same.

You need to give your the executable if you want to sell (or more general, distribute) software, and this is not different between e.g. Windows or Linux.

Does this answer your question?

Author Comment

ID: 10740217
You mean that to reverse engineer those objects are same as to reverse engineer binary file? If this is the case, I should be fine to deliver indivisual objects instead of binary file (in worst case, they might ask for these), right? Thanks.
LVL 44

Expert Comment

by:Karl Heinz Kremer
ID: 10740266
The only difference is that the individual object files are smaller.

I don't know about your product, but I doubt that your customer needs the object files. They probably want to run the software, which means that all they need are the executables.
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

LVL 12

Expert Comment

ID: 10741624
Hi http29,

Keep in mind: Binaries have been distributed for ages. Yes, people could split them into little .o chunks. This probably requires even quite limited effort thanks to ELF :-)

But no, the resulting little chunks (one .o for every global symbol *shudder*) are not of much use in terms of reverse-engineering.

LVL 12

Expert Comment

ID: 10741657
BTW: If you want to be on the safe side, you need a tool like "shroud" for C++. This will create an unreadable copy of your sources, renaming everthing to meaningless names (like a5235). Then you can even deliver your source code :-)))

Such a tool should be commercially available.

Author Comment

ID: 10741904
Thanks all of the replys. Since our product doesn't run on their platform, they think lib problems and ask for objects (most possible) so that they can relink and recompile (I don't know how). This is why we have so many concerns.

Featured Post

Why You Need a DevOps Toolchain

IT needs to deliver services with more agility and velocity. IT must roll out application features and innovations faster to keep up with customer demands, which is where a DevOps toolchain steps in. View the infographic to see why you need a DevOps toolchain.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Calibrating x & y screen  pixel coordinates 1 99
Supermicro 91 error 8 93
boost::uuid crashes 17 65
Fatal error: Exception code=C0000005 and VFP9 6 74
All of the resources available today make learning a new digital media easier than ever-- if you know where to begin. This is a clear, simple guide to a few of the basic digital art mediums and how to begin learning them on your own.
This article was originally published on Monitis Blog, you can check it here . If you have responsibility for software in production, I bet you’d like to know more about it. I don’t mean that you’d like an extra peek into the bowels of the sourc…
The viewer will learn how to user default arguments when defining functions. This method of defining functions will be contrasted with the non-default-argument of defining functions.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question