Reverse Engineering v/s Secure Coding

50 %
50 %
Information about Reverse Engineering v/s Secure Coding
Technology

Published on January 1, 2009

Author: amiable_indian

Source: slideshare.net

Reverse Engineering v/s Secure Coding.

What is Secure Coding? Is Secure Coding simply avoiding certain already discovered vulnerable functions? What about Tons of Commercial applications that are released everyday? Software Crackers (Reverse Engineers) causing Millions of Dollars of loss Globally due to Software Piracy. Are you Programmers taking your Job seriously?

Is Secure Coding simply avoiding certain already discovered vulnerable functions?

What about Tons of Commercial applications that are released everyday?

Software Crackers (Reverse Engineers) causing Millions of Dollars of loss Globally due to Software Piracy.

Are you Programmers taking your Job seriously?

Cryptography?...Hmm… Cryptography in Application Registration routines don’t make sense. Cryptographic Algorithm adds to the applications’ size & is Processor intense. Cryptographic Algorithm in Registration routines can be either completely ripped off or totally bypassed and they pose no challenge to a Cracker.

Cryptography in Application Registration routines don’t make sense.

Cryptographic Algorithm adds to the applications’ size & is Processor intense.

Cryptographic Algorithm in Registration routines can be either completely ripped off or totally bypassed and they pose no challenge to a Cracker.

Packers & Protectors? What are Packers? What are Protectors? Packers make Sense but Protectors don’t ! Packers == very easy to defeat. Protectors == who cares to defeat ? Virtual Machines?.... Not again!

What are Packers?

What are Protectors?

Packers make Sense but Protectors don’t !

Packers == very easy to defeat.

Protectors == who cares to defeat ?

Virtual Machines?.... Not again!

.Net & Java == Not Cool? Decompilation & not Disassembling. .Net is M$’s take on Java. .class files & .net executables rely heavily on Runtime Environment Components. Damn easy to break code and Damn tough to prevent us from Tampering with your App.

Decompilation & not Disassembling.

.Net is M$’s take on Java.

.class files & .net executables rely heavily on Runtime Environment Components.

Damn easy to break code and Damn tough to prevent us from Tampering with your App.

Mobile Devices…. Yeah! Sony Ericsson’s “.Sest” Feature talked about for the first time ever! J2me applications built for Mobile Devices should be “Freewares”. J2me Trojans can be very easy to code. Don’t even want to talk about Sony Ericsson & Siemens’ “Phone Modding”.

Sony Ericsson’s “.Sest” Feature talked about for the first time ever!

J2me applications built for Mobile Devices should be “Freewares”.

J2me Trojans can be very easy to code.

Don’t even want to talk about Sony Ericsson & Siemens’ “Phone Modding”.

Can I Tackle R.E ? Technically Speaking? No you Can’t! Logically ? Bore us to Death! How? a] Use spaghetti Code. b] Jump all over the Place. c] Learn Polymorphism. d] Learn to use your “Imagination” as a tool. e] Think like a Reverse Engineer!

Technically Speaking? No you Can’t!

Logically ? Bore us to Death!

How?

a] Use spaghetti Code.

b] Jump all over the Place.

c] Learn Polymorphism.

d] Learn to use your “Imagination” as a tool.

e] Think like a Reverse Engineer!

“ Thinking Before Writing, saves the time spent in Editing.” –Pirated. Thank You. Atul Alex Cherian, www.OrchidSeven.com . Ph:9860056788. [email_address]

Atul Alex Cherian,

www.OrchidSeven.com .

Ph:9860056788.

[email_address]

Add a comment

Related presentations

Related pages

Reverse Engineering v/s Secure Coding.. What is Secure ...

Reverse Engineering v/s Secure Coding.. What is Secure Coding? Is Secure Coding simply avoiding certain already discovered vulnerable functions? Is Secure.
Read more

ClubHack 2008 Presentations - Infosec Events

Reverse Engineering v/s Secure Coding by Atul Alex; ... Reverse Engineering for exploit writers by Nibin Varghese; State of Cyber Law in India by Rohas Nagpal;
Read more

Native v/s Hybrid Apps: Security Aspects | Appvigil

Native v/s Hybrid Apps: Security Aspects ... Reverse Engineering; ... developers follow secure coding guidelines during development and conduct a ...
Read more

PPT – Code Cracker PowerPoint presentation | free to ...

Code Cracker. Color, Shape, and ... Reverse Engineering v/s Secure Coding. ... Secure Web Coding w/Java - Responsible for consulting with application teams ...
Read more

Coding Techniques and Programming Practices

... This article provides coding techniques and programming practices for improving the quality ... Coding techniques incorporate many facets of ...
Read more

View source for Talks - ClubHack2008

You do not have permission to edit this page, for the following reason:
Read more