Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Can someone take linux C++ binary to break into individual objects or components?

Posted on 2004-04-01
6
Medium Priority
?
227 Views
Last Modified: 2013-11-15
Hi Guru:

Can someone take linux C++'s binary file and break into individual objects or components with same object name or different object name?

I am asking the questions since one company ask us to give them binary file. If they can break the binary into objects, it is easy for them to reverse engineer our code since. Please let me know if you already have the answers. Thanks.
0
Comment
Question by:http29
  • 2
  • 2
  • 2
6 Comments
 
LVL 44

Accepted Solution

by:
Karl Heinz Kremer earned 400 total points
ID: 10736263
You can - with a good disassembler and a huge amount of time - reverse engineer any executable, but this has nothing to do with potentially splitting an executable into the original object files.
I suspect that this can be done with a lot of effort, but again, it would not make any difference if you are dealing with the complete executable, or the individual object files. The effort to reverse engineer these two would be the same.

You need to give your the executable if you want to sell (or more general, distribute) software, and this is not different between e.g. Windows or Linux.

Does this answer your question?
0
 

Author Comment

by:http29
ID: 10740217
You mean that to reverse engineer those objects are same as to reverse engineer binary file? If this is the case, I should be fine to deliver indivisual objects instead of binary file (in worst case, they might ask for these), right? Thanks.
0
 
LVL 44

Expert Comment

by:Karl Heinz Kremer
ID: 10740266
The only difference is that the individual object files are smaller.

I don't know about your product, but I doubt that your customer needs the object files. They probably want to run the software, which means that all they need are the executables.
0
Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

 
LVL 12

Expert Comment

by:stefan73
ID: 10741624
Hi http29,

Keep in mind: Binaries have been distributed for ages. Yes, people could split them into little .o chunks. This probably requires even quite limited effort thanks to ELF :-)

But no, the resulting little chunks (one .o for every global symbol *shudder*) are not of much use in terms of reverse-engineering.

Cheers,
Stefan
0
 
LVL 12

Expert Comment

by:stefan73
ID: 10741657
BTW: If you want to be on the safe side, you need a tool like "shroud" for C++. This will create an unreadable copy of your sources, renaming everthing to meaningless names (like a5235). Then you can even deliver your source code :-)))

Such a tool should be commercially available.
0
 

Author Comment

by:http29
ID: 10741904
Thanks all of the replys. Since our product doesn't run on their platform, they think lib problems and ask for objects (most possible) so that they can relink and recompile (I don't know how). This is why we have so many concerns.
0

Featured Post

New feature and membership benefit!

New feature! Upgrade and increase expert visibility of your issues with Priority Questions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here in this article, you will get a step by step guidance on how to restore an Exchange database to a recovery database. Get a brief on Recovery Database and how it can be used to restore Exchange database in this section!
Eseutil Hard Recovery is part of exchange tool and ensures Exchange mailbox data recovery when mailbox gets corrupt due to some problem on Exchange server.
The viewer will learn how to use the return statement in functions in C++. The video will also teach the user how to pass data to a function and have the function return data back for further processing.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question