SHARE
Facebook X Pinterest WhatsApp

Security Portal: Open Source – Why it’s Good for Security

Written By
thumbnail
Web Webster
Web Webster
Apr 18, 2000

“Most attackers don’t need the source code.”

Hiding your program’s (or operating system’s) source code
doesn’t buy you the security that you’d expect. Hackers have been
reverse engineering or doing “Black Box analysis” for years.

Just because I can’t see the original C source code for a program
doesn’t mean that I can’t run it in a debugging, or code execution
trace environment, to watch its operation. The point to keep in
mind is this: for a computer’s processor to execute a program, it
has to be able to read each instruction. Each instruction is a bit
of machine code, which is transformed quite easily to assembly
code. Some programs can attempt to convert the machine/assembly
code into the more easily readable C code. As many people can read
C and Assembly, especially the hackers who will develop the
exploits against a program, closing the source doesn’t stop a
number of hackers from finding vulnerabilities in your program! A
recent example of this was illustrated in a Bugtraq post last
December, where BindView’s Todd Sabin illustrated a vulnerability
in Windows NT’s SYSKEY, which was discovered without source and was
aided by the use of a disassembler.”

“Even simpler “Black Box” analysis is alive and well. Many
vulnerable programs can even be cracked, or “exploited,” without
the need to understand the code well. The Spring 2000 edition of
2600 magazine contains an article on “Finding and exploiting bugs”
that focuses on attacking closed source programs by using
techniques like boundary testing, where you try feeding a program
unexpected input types to find bugs associated with boundary
conditions. Most software security problems stem from a few basic
programming flaws, such as buffer overflows, which can be detected
using this sort of analysis.”

Complete
Story

thumbnail
Web Webster

Web Webster

Web Webster has more than 20 years of writing and editorial experience in the tech sector. He’s written and edited news, demand generation, user-focused, and thought leadership content for business software solutions, consumer tech, and Linux Today, he edits and writes for a portfolio of tech industry news and analysis websites including webopedia.com, and DatabaseJournal.com.

Recommended for you...

A Thorough Approach to Improve the Privacy and Security of Your Linux PC
Damien
Oct 24, 2024
Several Russian Maintainers Removed From Linux Kernel Due To Compliance Concerns
Senthil Kumar
Oct 23, 2024
OpenSSH Splits Again: New Authentication Binary Unveiled
Bobby Borisov
Oct 16, 2024
13 Best Free and Open Source Anti-Malware Tools
webmaster
Oct 14, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.