Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A New Plan Might Make Software Reverse-Engineering Far More Difficult for Hackers

b2ap3_thumbnail_software_re-engineering_400.jpgHackers make life difficult for even the most innocent Internet user, and it’s all thanks to a nasty little trick called reverse-engineering. This is when a hacker picks apart the code that makes up a program, then scans it for vulnerabilities or exploitations. A new type of security measure is being developed to protect against the reverse-engineering of software.

When malware is eliminated from a machine, the same process occurs. The anti-malware software digs into the code of the malware and uses its vulnerabilities against it. However, what would happen if the PC could be protected from malware in the first place and prevent the reverse-engineering of the system? At the recent Singapore SyScan conference, security researcher Jacob Torrey presented his idea for what he called a Hardened Anti-Reverse Engineering System (HARES).

What’s so special about this particular concept? Well, HARES will attempt to encrypt the software code until the exact moment the processor needs to execute the code, meaning that the code can’t be analyzed for decryption while the code is being executed. According to WIRED:

The result is a tough-to-crack protection from any hacker who would pirate the software, suss out security flaws that could compromise users, and even in some cases understand its basic functions.

Of course, any tool that can be used for the good of cybersecurity could also potentially be turned toward evil purposes. HARES might not be meant to create malware that can’t be decrypted, but you can bet that some genius hacker will find a way to make it a reality; and that could compromise any unsuspecting system.

As it stands now, HARES can be tricked a number of ways. Whenever a program uses an encryption protocol like this, a decryption key must be installed into the computer’s CPU. This lets it decode the application when it must be opened. However, an experienced hacker might be able to intercept this key and use it to decrypt the application and examine the program’s commands.

Another way that hackers might try to take advantage of HARES is through debugging features found within some hardware. This allows for the analysis of commands made between the chip and the motherboard. Granted, in order to use such a tactic, hackers would need a spectacularly expensive tool, which they probably can’t afford. The only way this method might see use is on the national-state level.

In the face of new potential security threats like this, it’s important that you optimize your business’s security protocol. A Unified Threat Management (UTM) solution from Total Tech Care can help your business stay protected from the latest threats and vulnerabilities. It comes complete with an advanced firewall solution, antivirus, spam-blocking, and content-filtering solutions designed to keep you safe from whatever lurks in the shadows of the Internet. We’ll work with you to make sure it fits the needs and budget of your business. Give us a call at 866-348-2602 to learn more.

What are your thoughts on this potential new development in software encryption? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Communication IT Support Smartphones Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Cybersecurity Quick Tips Business Management Users Upgrade Managed IT Services Windows Phishing Outsourced IT Data Backup Ransomware Windows 10 Cloud Computing Office Data Recovery Server Save Money Passwords Windows 10 Saving Money Holiday Social Media Tech Term Chrome Virtualization Gadgets Automation Managed Service Microsoft Office Managed IT Services Artificial Intelligence Facebook Cybercrime Operating System Computers BYOD Wi-Fi Mobile Device Management Networking IT Support Health Hacking Internet of Things Information Technology Information Managed Service Provider Remote Spam Office 365 Alert Covid-19 Telephone Systems Bandwidth Employer-Employee Relationship Recovery Social Engineering Mobility Router BDR App Application History Password Money Encryption Data Breach Human Resources Applications Big Data Remote Monitoring Law Enforcement Mobile Computing Office Tips Training Blockchain Paperless Office Data Storage Apps Patch Management VPN Remote Computing Government Mobile Office Private Cloud How To Managed IT Bring Your Own Device Data Management Wireless Work/Life Balance Gmail Vulnerability Windows 7 Word Settings Infrastructure Google Drive Servers Two-factor Authentication Voice over Internet Protocol Mouse HaaS Avoiding Downtime Data Security Flexibility Marketing WiFi IT solutions Entertainment Website Budget USB Employee/Employer Relationship Cleaning RMM The Internet of Things Lithium-ion battery Staff Conferencing Software as a Service Telephone System Machine Learning End of Support Scam Connectivity Remote Work Physical Security Education Firewall Safety HIPAA Sports Virtual Reality Vendor Management Redundancy Apple Keyboard Social User Error Data Protection Meetings Vendor Managed Services Display Save Time Risk Management Hacker Hard Drive Access Control Hiring/Firing Computing Infrastructure DDoS Virtual Assistant IT Consultant Authentication Going Green Computing SharePoint Humor Business Intelligence Battery Customer Service Update Shadow IT Audit Environment Legal Worker Digital Signage IT Management Fax Server Google Docs Internet Exlporer Botnet Identity Theft IT Plan PDF SaaS Procurement Workplace Strategy Net Neutrality Unsupported Software Augmented Reality Proactive IT Network Congestion Help Desk Fraud Charger Virus Best Practice Printing eWaste Remote Worker Compliance YouTube Black Market OneNote Computer Care Unified Threat Management Current Events Computer Accessories Cryptocurrency Managed Services Provider Telephony Samsung Document Management Wearable Technology Database Retail Hard Drives Solid State Drive Comparison Wireless Technology Downtime Remote Workers Instant Messaging How to Value Robot CES Printer Excel Processor Bluetooth Spam Blocking Electronic Medical Records Data storage Biometrics Virtual Desktop Automobile Content Management Business Technology Peripheral Printers Mobile Windows 10s Millennials Monitor Digital Security Cameras Using Data Smart Office Cast Wireless Charging 5G Tip of the week webinar Science Emergency Copiers Quick Tip Virtual Private Network Professional Services Public Cloud Workforce Employer Employee Relationship Assessment Reputation Ergonomics Streaming Media Smartwatch Cables OLED Windows Server 2008 Customer Relationship Management Content Tech Support Development Distributed Denial of Service PCI DSS Project Management Virtual Machine Tools Nanotechnology Analyitcs Techology Telecommuting Laptop Television Customers 2FA Fiber Optics Employee Programming Cortana Cabling Audiobook Digital Signature Messaging Policy Warranty Hypervisor Touchpad Public Computer Dark mode Trend Micro Antivirus HVAC Consultant Google Apps Default App Regulations Politics Analysis Analytics Windows 8 Advertising Transportation SMS Procedure Administrator Saving Time IT service Devices Computer Fan Rootkit dark theme Notifications Shopping Enterprise Content Management Google Search Best Available MSP IT Infrastructure WIndows 7 Accountants Workers Tablet Benefits AI FinTech Microchip Domains Thought Leadership Bing FENG Credit Cards Password Manager IBM Relocation Social Network Password Management Investment Flash Maintenance Multi-Factor Security Smart Technology IaaS Employees Search Engine Employee/Employer Relationships Twitter Bloatware Video Games Worker Commute Business Mangement Supercomputer Windows 365 NIST ISP Software Tips ROI Sync User Experience Smart Tech Emails PowerPoint Tablets Trending Windows Media Player Video Conferencing Sales Bitcoin Addiction Shortcuts Entrepreneur Scalability Amazon Business Owner Recycling Point of Sale Personal Cryptomining Wiring Managing Stress Shortcut Practices Netflix Two Factor Authentication NarrowBand Supply Chain Management Monitoring Batteries Cache Root Cause Analysis Cost Management Search Amazon Web Services Social Networking Criminal Knowledge Cameras iPhone Windows 8.1 Music Digitize Safe Mode HBO GDPR Windows Server 2008 R2 Skype Hosted Computing Customer relationships Wireless Internet Data loss Online Shopping Outlook Leadership Files Email Best Practices Troubleshooting IT Assessment Running Cable File Sharing Manufacturing Camera Start Menu Inventory Memory Specifications Chromecast Loyalty Computer Tips Managed IT Service Wire Security Cameras Screen Mirroring Evernote Frequently Asked Questions Printer Server Colocation Travel Virtual CIO Books Uninterrupted Power Supply OneDrive Biometric Security

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code