Abstract [eng] |
This paper discusses main types of breaches which create backdoors for hacking also, methods which is being used to hack software, and damage that can be done after software gets hacked. Paper also, discusses security methods and explains what kind of attacks they can help to prevent, and what pros and cons they have. In this thesis obfuscation method and software for this method were analyzed more deeply. One of open source software was improved in such way that it is able to do few tools functionality in one tool. Software can obfuscate code in more advanced way, so code is much harder to analyze for a hacker and static analysis tools. This software uses flow structures obfuscation algorithms, that were created by doing this thesis and original algorithms that were created by Maurice Fonk – this tool creator. Tests that were done for this tool compares original and obfuscated code throughput and functionality – does code do the same functionality without errors after obfuscation. |