Just like the hacking scene has its script kiddies, leisure-time hackers, professional hackers, and all-stars, the software protection world allows you to opt for a homegrown solution, implement a cheap product, select a fully dedicated technology that has been leading the global market since decades, or even go the extra mile. It’s easy to agree that protecting is better than having your head in the sand, but in essence, there is no absolute right or wrong approach: The means of protection need to be appropriate for the value and appeal of your software.
With CodeMeter AxProtector and its variants, you already have a set of tools that allows you to easily safeguard your compiled applications. No automatic hacking would work, as the overall goal of AxProtector is to automatically encrypt your application code and insert countermeasures against standard hacking techniques. To increase security even more, you can additionally encrypt individual functions with IxProtector and implement customized checks with CodeMeter Core API.
Now, with CodeMoving, we make a leap into optimal protection: CodeMoving lets you move essential code into a CmDongle for execution far away from the prying eyes of would-be hackers. Once you move fragments of code into the CmDongle, you make the mischievous exploit simply impossible to achieve.
Join us for a discovery journey to the ultimate frontier of software protection:
With CodeMoving, you can create as many code fragments as you want for execution in the CmDongle. To move the code, the application is encrypted with AxProtector; all functions to be moved are compiled by AxProtector and kept fully encrypted within the application like an IxProtector protected function. While IxProtector decrypts and executes the block in question in the memory of the computer during runtime, CodeMoving first moves it into the CmDongle to be decrypted and executed with the right input parameters. The output parameters are then returned to the application. The architecture of CmDongles also plays a significant role in keeping your code safe. CodeMoving is more secure than IxProtector, while IxProtector offers a better performance of the protected code. To get the optimal solution for your application a combination of CodeMoving and IxProtector is possible.
However, before you start applying CodeMoving, there are some prerequisites and recommendations that you should be aware of. Register now to learn all the technical details and best practices our experts will share during this session.
They are ancrypted by AxProtector and stored / placed within the application. When I read this sentence it sounds like they get encrypted from the application (so it is executed within the application). We should make this more clear.
For those who join us live and answer a three-question survey at the end of the session correctly, there is an additional treat in store: We will draw the winner of an Amazon coupon worth 50 EUR. The winner will be notified in the replay announcement. Please note that the winner will be excluded from all subsequent prize draws of 2018.
In our new masterclass, we are going to zero in on:
Introduction - The view of the hacker
Available hacking tools
Types of cyber attacks
Foundations of CmDongle
Encryption via Product Code
Key change with Encryption Code
Maximum Encryption Rate
A scalable perspective
CodeMeter API – Simple API calls
AxProtector – Encrypting the complete application
IxProtector – Encrypting individual functions
CodeMoving – Transferring functions into the CmDongle
Simple CodeMoving function
Using cryptography in CmDongles
State memory in CmDongles
Scalability is as crucial in software licensing as it is in protection. Seize the opportunity to build up the technological know-how to apply the tools and techniques required in the markets you serve.