Crack Matlab Executable file?
29 views (last 30 days)
What is the robustness of Deploytool software in creating Matlab executable files? Are there any specific parameters we need to use to ensure the robustness or in general using the Deploytool provides sufficient protection to the source code?
Can anyone comment if the Matlab executable file can be cracked?
Walter Roberson on 7 Apr 2014
I am not aware of any encryption form that cannot be reverse engineered -- not unless there is hardware support (e.g., Quantum Encryption.)
pcode can be reverse engineered to some degree.
deploytool uses AES, which is known to be breakable in finite time. (It is finite and it is deterministic, so at worst you use brute force for a few trillion years.)
Juan Vanegas on 11 Nov 2016
I created a Matlab EXE file using deploytool and just using any commercial compressing tool it is possible to "unzip" the EXE and get all the .m files. It's true that the .m code is somewhat obfuscated and not readable at once, but functionality can be retrieved. You can type 'help' to any unzipped function and it will display the header text if any. In case you include a .mat file into your EXE file, the decompression will retrieve you the original .mat file which can then be easily loaded into Matlab as it is untouched by the obfuscation. Same for figures and text files.