A recent article in Wired magazine explained how some very smart mathematicians had theorized for years that there was a way to use encryption techniques to protect executable code as well as data. As far as I can tell, most of them never got around to it as they thought the mathematical simulation and proof that this would work was estimated to be a 3 many year project. However, some new research and concept tools in this area are close to coming to fruition and hence the article.
But what if someone with a lot of experience in obfuscation tools, and others, created a new complex tool set that used a variety of techniques simultaneously to properly protect sensitive parts (or the whole) of a software system? Tools that can balance speed, protection and size? Tools that can protect object code as well as work on source code? That is what Dr. Jacobi has been doing for White Hawk for the past 3 years using intense applied science, starting from a clean slate. Plus he previously worked for a major vendor in this area where they applied completely different techniques.
He has developed a software protection technique based on random control of novel obfuscations, mutually checking protection aspects, and algorithmic combinations of diverse code primitives. We are busy packaging the X-86 version of this as NEST-X86 for demo and beta testing in late March 2014. Forget trying to model its strengths and weaknesses, as each company will implement their chosen protection plans in different ways with this tool set.
Do think about signing up to be a beta tester or even a beta breaker – if you can.
(C) Copyright 2014 White Hawk Software