Summary
1. Code protection is a process, not the result. New hacking methods are invented, and
new versions of JVM are released allowing more manipulations with JVM memory, etc.
Here is the same war as a virus – antivirus.
2. In other words, neither an absolute weapon nor an absolute defense exists and cannot
exist. Any new method of attack generates the corresponding method of defense
reflecting this attack.
3. An intrusion detection process similar to the observer effect in quantum physics is
used in almost every case of developing protection algorithms.
4. Any observation (intervention) – dumping, remote agent, etc. causes disturbance in
the observed environment that can be noticed and protective means will be taken.
5. Thus, we have a classic example of the evolution of the attack-defense system.
It means that for each action of an attack, there is a defense and, naturally, vice
versa. Let’s just note that the defense is always in the best position.