Obfuscation and Anonymization Transformation: Difference between revisions

Jump to navigation Jump to search
No edit summary
 
Line 10: Line 10:
* '''Anonymization mode''': performs a superset of obfuscation. '''All possible identifiers are renamed''', stripping even more semantic information than is present in the resulting object code. This mode offers more confidentiality especially for code with many global variables and sensitive function names.
* '''Anonymization mode''': performs a superset of obfuscation. '''All possible identifiers are renamed''', stripping even more semantic information than is present in the resulting object code. This mode offers more confidentiality especially for code with many global variables and sensitive function names.


In both modes, the functionality and original structure of the code are preserved. Secure Hash Algorithms '''SHA‑1''' and '''SHA‑256''' are employed as the basis for deterministic renaming.
In both modes, the original functionality and logical structure of the code are preserved. Deterministic renaming is achieved by using secure hash algorithms ('''SHA‑1''' or '''SHA‑256''') with a user-defined seed. While these algorithms are not used for cryptographic protection in this context, they guarantee consistent and repeatable identifier transformations across builds.


===Typical Usage and Benefits===
===Typical Usage and Benefits===
Bots, Bureaucrats, Interface administrators, smwadministrator, smwcurator, smweditor, Administrators
2,557

edits

Cookies help us deliver our services. By using our services, you agree to our use of cookies.

Navigation menu