Solved

Can someone take linux C++ binary to break into individual objects or components?

Posted on 2004-04-01
6
223 Views
Last Modified: 2013-11-15
Hi Guru:

Can someone take linux C++'s binary file and break into individual objects or components with same object name or different object name?

I am asking the questions since one company ask us to give them binary file. If they can break the binary into objects, it is easy for them to reverse engineer our code since. Please let me know if you already have the answers. Thanks.
0
Comment
Question by:http29
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
6 Comments
 
LVL 44

Accepted Solution

by:
Karl Heinz Kremer earned 100 total points
ID: 10736263
You can - with a good disassembler and a huge amount of time - reverse engineer any executable, but this has nothing to do with potentially splitting an executable into the original object files.
I suspect that this can be done with a lot of effort, but again, it would not make any difference if you are dealing with the complete executable, or the individual object files. The effort to reverse engineer these two would be the same.

You need to give your the executable if you want to sell (or more general, distribute) software, and this is not different between e.g. Windows or Linux.

Does this answer your question?
0
 

Author Comment

by:http29
ID: 10740217
You mean that to reverse engineer those objects are same as to reverse engineer binary file? If this is the case, I should be fine to deliver indivisual objects instead of binary file (in worst case, they might ask for these), right? Thanks.
0
 
LVL 44

Expert Comment

by:Karl Heinz Kremer
ID: 10740266
The only difference is that the individual object files are smaller.

I don't know about your product, but I doubt that your customer needs the object files. They probably want to run the software, which means that all they need are the executables.
0
Creating Instructional Tutorials  

For Any Use & On Any Platform

Contextual Guidance at the moment of need helps your employees/users adopt software o& achieve even the most complex tasks instantly. Boost knowledge retention, software adoption & employee engagement with easy solution.

 
LVL 12

Expert Comment

by:stefan73
ID: 10741624
Hi http29,

Keep in mind: Binaries have been distributed for ages. Yes, people could split them into little .o chunks. This probably requires even quite limited effort thanks to ELF :-)

But no, the resulting little chunks (one .o for every global symbol *shudder*) are not of much use in terms of reverse-engineering.

Cheers,
Stefan
0
 
LVL 12

Expert Comment

by:stefan73
ID: 10741657
BTW: If you want to be on the safe side, you need a tool like "shroud" for C++. This will create an unreadable copy of your sources, renaming everthing to meaningless names (like a5235). Then you can even deliver your source code :-)))

Such a tool should be commercially available.
0
 

Author Comment

by:http29
ID: 10741904
Thanks all of the replys. Since our product doesn't run on their platform, they think lib problems and ask for objects (most possible) so that they can relink and recompile (I don't know how). This is why we have so many concerns.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This post contains step-by-step instructions for setting up alerting in Percona Monitoring and Management (PMM) using Grafana.
Curious about the latest ransomware attack? Check out our timeline of events surrounding the spread of this new virus along with tips on how to mitigate the damage.
The viewer will learn how to clear a vector as well as how to detect empty vectors in C++.
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This videā€¦

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question