There is some traffic on sci.crypt about cloakware, which apparently
transforms executables into semantically equivalent but very removed from
the human-interface flow, in order to make reverse-engineering and mods
more difficult.

Does anyone have more insight into this ?

sci.crypt:

It seems our job posting has generated a bunch of questions. This
is an attempt to answer some of them.

To start with, I (Stanley Chow) am the VP of Engineering of Cloakware
and one of the names in US patent 5748741. I will gather the questions
from this thread and try to answer them. Since we were not planning
to go public quite so soon, many answers will leave you dangling. Our
first public appearance is a 5-minute talk at the IEEE Symposium in
Oakland in the middle of May. 

If anyone wants to get more information, please contact:
   [EMAIL PROTECTED]
(If you let them sense big dollars, then it will be easy to sign 
the NDA and get to the good stuff; otherwise you might as well just
browse our web site and read the whitepapers).

The way to get the real low-down is to come join us - a start-up 
that is doing really exciting stuff, and become fabulously rich while
working on really interesting problems.


Q: What is Cloakware (the technology)
=====================================

Cloakware Technology makes software *effectively* tamper-proof. The
protected software still runs. For example, the protected software
could be a Java Class files - a boring standard compliant class file
that will run on any (correct) JVM. This protected software would be
very hard to tamper with. (Yes, there are some fine prints about what
"tamper" means).

Yes, we know about jamming branches, debuggers, emulators, reverse-
engineering tools. No, we are not nuts (at least I don't think so :-)


Q: How is Cloakware related to Nortel
=====================================

Cloakware Corporation is un-related to Nortel except that we hope to
sell to them (as we would hope for any other company). Some of the
people happens to have worked for Nortel in the past, and even filed 
patent(s) in the same area. These patents are not related to the 
activities at Cloakware.


Q: What is the patent status
============================

We, in Cloakware, have also filed a number of patents that cover new
ground. These patents are totally owned by Cloakware and not related
to Nortel. None of these patents have been granted yet nor have any
of them reached the publication date (that I know off), so you are
unlikely to find them on the net.


Q: How are we different from "shroud", "obfuscator", compiling, ...
===================================================================

The shrouds and obfuscators are very superficial. They merely remove
debugging information, rename variables, etc. Some commercial products
do a little bit more, but by and large, the program semantic is left
unchanged. There is no real challenge in fiddling them.

Compiling is slightly better. Many people would argue that a good 
optimizing compiler is pretty good against reverse-engineering and
tampering; this is demonstratably not very strong - we have all done
patches on binary-only program. At most, one would call them "weakly
tamper-resistant" (or in Bruce's scale, good enough to prevent your
kid-sister from tampering.)

Cloakware Technology acts on a much deeper level and is much stronger.


Q: What is our threat model
===========================

We are aiming (which is to say we are not there yet, but think we can)
at a very severe threat-model: the attackers have all our patents, 
publications and even internal documentation, they also have our 
"encoder" (or what some people call the "cloaker") and can experiment 
with it, they also have unlimited funds to get debuggers/emulators/...
as they wish. Even for this threat model, we hope to be able to make 
it really expensive for the attacker.


Q: How are we different from "copy protection"
==============================================

The old Apple II and early PC saw lots of fun techniques dedicated to
preventing people from making copies. Typically, some trick was used
on the disk (half-track, quarter-track, spiral-track, burnt-spot were
amongst the most fun) and the code checked for the presence of these
tricks. The "crack" usually works by disabling these checks. This led
to an escalating war of protecting the S/W.

Many techniques were used to protect the S/W - checksums, encryption,
multiple layers of them, changing code already in the pre-fetch (to
defeat debuggers) and so on. They were all broken within days. They
were also often not portable (heck, many ran only on specific versions
of some chips).

In contrast, Cloakware is totally portable and (we believe) much 
stronger.


Q: Can some tool automatically "de-cloak"?
==========================================

We don't think so (but I won't go into the details).

Reply via email to