15 One Solution For Protecting PHP Source Code
15 One Solution For Protecting PHP Source Code
net/publication/262937544
CITATIONS READS
0 4,434
2 authors:
Some of the authors of this publication are also working on these related projects:
Sinteza - International Scientific Conference on ICT and E-Business Related Research View project
Implementation of Artificial Intelligence in human-computer interaction analysis and evaluation of cognitive performances View project
All content following this page was uploaded by Nenad Ristić on 10 June 2014.
doI: 10.15308/SInteZa-2014-616-619
Abstract:
Protecting PHP scripts from unwanted using, copying and modifications is a vast problem
today. Present solutions on source code level are mostly working as obfuscators, are free,
and are not providing any serious level of protection. Solutions that are based on encoding Key words:
opcode are more secure but are commercial and require closed-source proprietary PHP PHP,
interpreter’s extension. Furthermore, encoded opcode is not compatible with future ver- interpreted languages,
sions of interpreters which involve re-buying encoders from authors. Finally, if extension source code,
source-code is compromised, all script encoded by that solution are compromised too. In protection,
this paper we present a novel model for free and open-source PHP script protection solution. encryption.
Lifetime of protected solution in this case is limited by Based on exposed results and insights from cryptology
source code compatibility with future PHP interpreters based analysis, we propose a novel solution model that
versions, or by digital certificate lifetime (which can be provides protection of PHP scripts on both source code
unlimited), whatever comes first. However, problem of and opcode levels, and is not based on trusted third party.
location where PHP interpreter’s private key is stored, and Protection level of proposed solution is equal to currently
how it’s used, remains. Potential solution is storing private available commercial solutions, based on closed-source
key within interpreter’s binary, so only reverse engineer- components.
618
SINTEZA 2014 Data security
619