Advertisement

The Effort Performance Relationship in Software Protection

The Effort Performance Relationship in Software Protection Download the slidedeck:


“Less is more” is a popular oxymoron. In software protection, most ISVs might express this commonplace statement as "I would like to achieve maximum protection with minimal effort". But is this possible at all? Can you really expect the strongest encryption method with just a minimum investment in your own resources?

Wibu-Systems has solved this paradox with CodeMeter Protection Suite. Guided tools that encrypt a compiled application or a library in an automatic and secure way are made available for all common platforms. AxProtector, AxProtector .NET, and AxProtector Java are your reliable companions for this rapid and straightforward process.

For the optimal protection of your software application, the code should be split into individual parts and dynamically reassembled at runtime. AxProtector .NET and AxProtector Java take care of this operation in a fully automated fashion for you. But what about native applications and libraries that are protected with AxProtector? In this case, IxProtector, integrated with AxProtector, takes over this procedure for you. You can choose between semi-automatic and fully manual controls.

This is where Translocated Execution enters the scene and inserts automatic decryption routines into your application. In addition to the implementation of simple automatisms, Translocated Execution also moves executable code into memory. Functions are temporally superimposed, so that finding a dedicated function in a memory dump becomes a matter of pure luck for a would-be attacker and a systematic memory dump of all functions becomes practically impossible.

In short, Translocated Execution offers two main advantages:

The automatic decryption and execution of the code reduces your manual efforts to a minimum
Moving code into memory increases security standards against memory dumps.

Software Protection,CodeMeter,Cybersecurity,Software security,licensing,decryption,encryption,cryptography,license management,

Post a Comment

0 Comments