News

Third-Party Perils

Analyst, firms warn that outsourcing development poses risk to intellectual property.

Farming out pieces of an in-house app for development by third parties may make sense when time and money are short. But dev shops working with outside firms should take steps to protect the intellectual property contained in their code, security experts and vendors warn.

"The whole software outsourcing industry is seeing a pyramid scheme emerging in that the large outsourcing vendors would act as a general contractor and would outsource further to smaller vendors, and so on and so forth," Forrester Research Inc. analyst Chenxi Wang says. "Before you know it, your code is developed by someone who's sitting in his garage in the village of Bangalore."

Risk vs. Reward
Wang says she's only half joking.

The dilemma is that the developing countries where talented programmers work cheap generally are the same ones that pose the greatest risk of IP theft, says Vic DeMarines, vice president of products for software protection vendor V.i. Laboratories Inc.

DeMarines says customers often say they didn't define a formal IP protection strategy because they felt trapped between two extremes: "'Gee, we need to take advantage of this new China team to develop an app, so we need to provide them the full source code,' or, 'There's no way we're going to do outsourcing.'"

V.i. Labs' CodeArmor was originally designed to prevent reverse engineering of deployed apps. But a secure debugging encryption feature new to the recently released 2.0 version grew out of increasing concern from customers regarding outsourcing dev work or allowing partners to extend an app. It allows the team developing the software to grant appropriate code access to customers, partners or outsourcers through a password or digital certificate "without giving up all your intellectual property," DeMarines says.

Reducing Vulnerabilities
Wang says software developed on the .NET and Java platforms is especially vulnerable to reverse engineering, compared to traditional binary code written in C or C++. She recommends dev shops try to segregate the rest of the code base from the piece the third party is working on by providing only the relevant interface. She also suggests obfuscating code as much as possible.

"You may be able to expose only the API to the third party," she says. "This isn't always feasible, though."

Sebastian Holst, vice president of sales and marketing for obfuscation vendor PreEmptive Solutions LLC, maker of the Dotfuscator tool for .NET, stresses that dev shops also should insist that any third-party developers extending an app must obfuscate their finished work, too.

"What often happens is they may be less concerned about the binaries that contain your source code than you would be," he says. "By forcing them to obfuscate whenever they are done, it raises the bar for all the people they interact with."
comments powered by Disqus

Featured

  • Creating Reactive Applications in .NET

    In modern applications, data is being retrieved in asynchronous, real-time streams, as traditional pull requests where the clients asks for data from the server are becoming a thing of the past.

  • AI for GitHub Collaboration? Maybe Not So Much

    No doubt GitHub Copilot has been a boon for developers, but AI might not be the best tool for collaboration, according to developers weighing in on a recent social media post from the GitHub team.

  • Visual Studio 2022 Getting VS Code 'Command Palette' Equivalent

    As any Visual Studio Code user knows, the editor's command palette is a powerful tool for getting things done quickly, without having to navigate through menus and dialogs. Now, we learn how an equivalent is coming for Microsoft's flagship Visual Studio IDE, invoked by the same familiar Ctrl+Shift+P keyboard shortcut.

  • .NET 9 Preview 3: 'I've Been Waiting 9 Years for This API!'

    Microsoft's third preview of .NET 9 sees a lot of minor tweaks and fixes with no earth-shaking new functionality, but little things can be important to individual developers.

  • Data Anomaly Detection Using a Neural Autoencoder with C#

    Dr. James McCaffrey of Microsoft Research tackles the process of examining a set of source data to find data items that are different in some way from the majority of the source items.

Subscribe on YouTube