obfuscator

(redirected from Obfuscated code)
Also found in: Wikipedia.

obfuscator

A program that scrambles source code in order to make the program difficult to understand or reverse engineer. Because it is an interpreted language that is run from the original source code, scripting languages such as JavaScript are open to public inspection. Without being obfuscated (made unclear), the source code can be easily copied and modified for other purposes.

Obfuscation Techniques
The most common obfuscation techique is to change variable and function names to long nonsense words; for example, from TaxRoutine to 87n39y7_9yjn13, or worse yet a 15-digit binary number. That combined with removing all comments makes a program undecipherable. Eliminating all unnecessary line breaks also jumbles up the works, and there are other tricks of the trade.

Obfuscators for machine code are also available. See e-mail obfuscator.
References in periodicals archive ?
The cybercrime intelligence report covers the following: - On the buyer side of the trading platform, batches of 1,000 malware-infected PCs can be purchased for $5 up to $100; depending on territory - Partners are paid for successfully distributing the bot and collecting FTP-credentials of legitimated websites through the infected PCs - On the seller side of the trading platform, cybercriminals sell batches of 1,000 malware-infected PCs for $25 up to $500 - Compromised malware infected PCs may be infected with additional malware each time they are purchased by a new "owner" - For attacks and exploitations, an exploit toolkit with obfuscated code and the Trojan Zalupko attack toolkit are provided
The quality of an obsfuscating transformation t is measured using four criteria: how hard is for human readers to understand the obfuscated code (potency), how hard is for an automated tool to revert the transformation (resiliency), how well the obfuscator's introduced code blends with the original code (stealth) and how much extra cost, if any, the obfuscation introduces (cost).
Potency: The potency of an obfuscation technique indicates, how harder is the obfuscated code to read for a human reader compared with the original source.
In order to prevent dynamically obfuscated code and similar types of advanced hacking techniques, we recommend businesses to include real-time content inspection products to analyze and understand the active code embedded within Web pages on-the-fly before it reaches the end user machine," he said.
This obfuscated code makes the process of finding threats more difficult, Friedrichs says, though he added that Symantec and some other antivirus companies "have the ability to basically detect threats that have been compressed and write definitions that do detect threats once they've been compressed and encrypted like this.
Cyber criminals are using increasingly sophisticated tactics to evade detection including obfuscated code.
Finjan's real-time web security solutions utilize patented behavior-based technology to repel all types of threats arriving via the web, such as spyware, phishing, Trojans, obfuscated code and other malicious code, securing businesses against unknown and emerging threats, as well as known malware.
id=827 ) - Evolution of malicious obfuscated code - MPOM September 2008 (http://www.
Real-time content inspection is the optimal way to detect and block dynamically obfuscated code and similar types of advanced cybercrime techniques, since it analyzes and understands the code embedded within web content or files in real time - before it reaches the end-users.
In its Latest Malicious Page of the Month Report, Finjan Describes the Malicious Obfuscated Code Evolution, Including Examples of its Increased Sophistication and Effectiveness
Finjan's real-time web security solutions utilize patented behavior-based technology to repel all types of threats arriving via the web, such as spyware, phishing, Trojans, obfuscated code and other malicious code, securing businesses against unknown and emerging threats, as well as known malware Finjan's security solutions have received industry awards and recognition from leading analyst houses and publications, including IDC, Butler Group, SC Magazine, eWEEK, CRN, ITPro, PCPro, ITWeek, Network Computing, and Information Security.
7 now includes: * Support for fragmented functions and obfuscated code.