Hi All,
I've written a security driver to communicate with a Dallas 1-wire SHA device to do message authentications with using SHA-1 encryption to hinder product cloning.

Now that this is done and working, I popped open the .ko file in a hex editor and sure enough, all my function names and other unwanted information is right there in the kernel module.

I believe this is an ELF format since that is list in the first 10 bytes or so within the .ko file.

Is there any tool(s) to strip all unnecessary information from a kernel module to tighten it up so reverse engineering will be more difficult?


Thanks!

-AM