SlideShare a Scribd company logo
1 of 25
Download to read offline
The Effort-Performance Relationship
in Software Protection
Alvaro Forero | Security Expert
alvaro.forero@wibu.com
Ruediger Kuegler | Security Expert
ruediger.kuegler@wibu.com
Virtual CodeMoving with
Translocated Execution
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 1
Agenda
 Overview of CodeMeter Protection Suite
 AxProtector
 IxProtector
 Translocated Execution
 Live Demo
 Summary – Security
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 2
CodeMeter
Protection Suite
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 3
CodeMeter Protection Suite
CodeMeter Protection Suite
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection
Automatic Protection
(IP Protection)
Anti-Debug Methods
Used
CodeMeter Variant
Individual
Function Encryption
Integrity Protection
(Tamper Protection)
Authenticity of Software
(Secure Loader / Authenticity)
Java SE
Java EE
Embedded
Operating System
.NETPC (Windows,
Linux, macOS)
CodeMeter
Runtime
CodeMeter
Runtime
CodeMeter
Runtime
CodeMeter
Embedded
CodeMeter
Embedded
IxProtector
AxProtector
AxProtector .NET
AxProtector Java
AxProtector CmE
ExProtector
4
AxProtector
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 5
Protected Application
AxProtector
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 6
Compiled Application
Data Section
Resource Section
Code Section
AxProtector
Header
Data Section
Resource Section
Code Section
Header
Encrypted
Code Section
Encrypted
Data Section
Encrypted
Resource Section
AxEngine
(Security Engine)
Compiled Application
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 7
Protected Application
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 8
Security Options
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 9
 Resource Encryption
 Code modifications
 Static
 Dynamic
 Debugger Checks
 Basic
 Advanced
 Generic
 Locking of licenses
No Inter-Section Calls (Option –a)
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 10
Protected ApplicationCompiled Application
Header
AxProtector
Header
Data Section
Resource Section
Code SectionCode Section
Data Section
Resource Section
Code SectionEncrypted
Code Section
Encrypted
Data Section
Encrypted
Resource Section
AxEngine
(Security Engine)
IxProtector
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 11
Protected Application
AxEngine
(Security Engine)
Compiled Application
IxProtector
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 12
IxProtector
Header
Data Section
Resource Section
Code Section
Function Function
Header
Code Section
Data Section
Resource Section
Function Function
Encrypted
Function
Encrypted
Function
Encrypted Single Function
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 13
Encrypted Code Makes No Sense
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 14
Unencrypted Code Encrypted (nonsense) Code
Protected Application
AxEngine
(Security Engine)
Compiled Application
AxProtector and IxProtector
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 15
AxProtector
IxProtector
Header
Data Section
Resource Section
Code Section
Function Function
Header
Code Section
Data Section
Resource Section
Function Function
Encrypted
Function
Encrypted
Function
Encrypted
Data Section
Encrypted
Resource Section
Encrypted
Code Section
Encrypted
Function
Encrypted
Function
IxProtector (During Runtime - Standard)
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 16
 Start of the application
 …
 Calling WupiDecryptCodeId(n)
 Decrypts function n in place
 Executing function n
 Calling WupiEncryptCodeId(n)
 Encrypts function n in place
 …
Protected Application
Header
Code Section
Data Section
Function Function
Encrypted
Function
Encrypted
Function
Encrypted
Data Section
Encrypted
Code Section
Encrypted
Function
Encrypted
Function
Encrypted
Resource Section
AxEngine
(Security Engine)
Translocated Execution
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 17
Protected ApplicationCompiled Application
IxProtector with Translocated Execution
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 18
IxProtector
Header Header
Code Section
Function Function
Data Section
Resource Section
Code Section
Data Section
Resource Section
Function FunctionStub
Enc.
Function
Stub
Enc.
Function
Encrypted Functions
AxEngine
(Security Engine)
Protected ApplicationCompiled Application
AxProtector and IxProtector with Translocated Execution
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 19
AxProtector
IxProtector
Header
Data Section
Code Section
Function Function
Header
Encrypted Functions
Resource Section
Code Section
Data Section
Resource Section
Function FunctionStub
Enc.
Function
Stub
Enc.
Function
Encrypted Code Section
Stub
Enc.
Function
Stub
Enc.
Function
Enc. Resource Section
Encrypted Data Section
AxEngine
(Security Engine)
IxProtector (During Runtime – With Translocated Execution)
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 20
 Start of the application
 …
 Executing function n
 Decrypts function n on heap
 Jumps to function n
 Removes (overrides) function n from
heap
 …
 Next function at the same location Protected Application
AxEngine
(Security Engine)
Header
Encrypted Functions
Code Section
Data Section
Stub
Enc.
Function
Stub
Enc.
Function
Encrypted Code Section
Stub
Enc.
Function
Stub
Enc.
Function
Encrypted Data Section
Heap
FunctionFunction
Enc. Resource Section
Available Options
 Automatic (1)
 Decryption, Execution, Deletion
 Manual (2)
 WupiDecryptCodeId, Call, WupiEncryptCodeId
 Automatically with cache (5)
 Decryption, Execution, Caching
 Deletion after x seconds
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 21
Demo
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 22
Summary – Security
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 23
Security
 AxProtector decrypts the complete executable when starting the
application
 Anti-Dumping, Modifications and resource encryption
 Prevention of inter-section calls
 IxProtector keeps many single functions encrypted in memory
 Decryption during runtime on demand
 Translocated Execution makes it even harder to detect these functions
during runtime
 Dynamic and automatic decryption during runtime
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 24
Germany: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
http://www.wibu.com
info@wibu.com
Thank you for your active participation!
06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 25

More Related Content

What's hot

Perfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the HackersPerfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the Hackersteam-WIBU
 
Using Tetration for application security and policy enforcement in multi-vend...
Using Tetration for application security and policy enforcement in multi-vend...Using Tetration for application security and policy enforcement in multi-vend...
Using Tetration for application security and policy enforcement in multi-vend...Joel W. King
 
Jamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS SecurityJamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS Securitycentralohioissa
 
"Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (...
"Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (..."Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (...
"Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (...Tech in Asia ID
 
Business Ready Teleworker Design Guide
Business Ready Teleworker Design GuideBusiness Ready Teleworker Design Guide
Business Ready Teleworker Design GuideJoel W. King
 
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...NetworkCollaborators
 
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...NetworkCollaborators
 
A Shelter to Protect your Documents
A Shelter to Protect your DocumentsA Shelter to Protect your Documents
A Shelter to Protect your Documentsteam-WIBU
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...NETSCOUT
 
Rethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native eraRethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native eraPriyanka Aash
 
API 102: Programming with Meraki APIs
API 102: Programming with Meraki APIsAPI 102: Programming with Meraki APIs
API 102: Programming with Meraki APIsJoel W. King
 
Azure IIoT for Manufacturing and Beyond @ IAMCP event June 2019
Azure IIoT for Manufacturing and Beyond @ IAMCP event June 2019Azure IIoT for Manufacturing and Beyond @ IAMCP event June 2019
Azure IIoT for Manufacturing and Beyond @ IAMCP event June 2019pietrobr
 
World Wide Technology | Red Hat Ansible for Networking Workshop
World Wide Technology | Red Hat Ansible for Networking WorkshopWorld Wide Technology | Red Hat Ansible for Networking Workshop
World Wide Technology | Red Hat Ansible for Networking WorkshopJoel W. King
 
CSW2017 Scott kelly secureboot-csw2017-v1
CSW2017 Scott kelly secureboot-csw2017-v1CSW2017 Scott kelly secureboot-csw2017-v1
CSW2017 Scott kelly secureboot-csw2017-v1CanSecWest
 
Secure and power the intelligent edge with Azure Sphere
Secure and power the intelligent edge with Azure SphereSecure and power the intelligent edge with Azure Sphere
Secure and power the intelligent edge with Azure SphereMicrosoft Tech Community
 

What's hot (16)

Perfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the HackersPerfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the Hackers
 
Using Tetration for application security and policy enforcement in multi-vend...
Using Tetration for application security and policy enforcement in multi-vend...Using Tetration for application security and policy enforcement in multi-vend...
Using Tetration for application security and policy enforcement in multi-vend...
 
Jamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS SecurityJamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS Security
 
"Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (...
"Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (..."Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (...
"Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (...
 
Business Ready Teleworker Design Guide
Business Ready Teleworker Design GuideBusiness Ready Teleworker Design Guide
Business Ready Teleworker Design Guide
 
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
 
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
 
A Shelter to Protect your Documents
A Shelter to Protect your DocumentsA Shelter to Protect your Documents
A Shelter to Protect your Documents
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
 
Rethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native eraRethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native era
 
API 102: Programming with Meraki APIs
API 102: Programming with Meraki APIsAPI 102: Programming with Meraki APIs
API 102: Programming with Meraki APIs
 
Azure IIoT for Manufacturing and Beyond @ IAMCP event June 2019
Azure IIoT for Manufacturing and Beyond @ IAMCP event June 2019Azure IIoT for Manufacturing and Beyond @ IAMCP event June 2019
Azure IIoT for Manufacturing and Beyond @ IAMCP event June 2019
 
World Wide Technology | Red Hat Ansible for Networking Workshop
World Wide Technology | Red Hat Ansible for Networking WorkshopWorld Wide Technology | Red Hat Ansible for Networking Workshop
World Wide Technology | Red Hat Ansible for Networking Workshop
 
CSW2017 Scott kelly secureboot-csw2017-v1
CSW2017 Scott kelly secureboot-csw2017-v1CSW2017 Scott kelly secureboot-csw2017-v1
CSW2017 Scott kelly secureboot-csw2017-v1
 
Building Secure IoT Solutions using Azure Sphere
Building Secure IoT Solutions using Azure SphereBuilding Secure IoT Solutions using Azure Sphere
Building Secure IoT Solutions using Azure Sphere
 
Secure and power the intelligent edge with Azure Sphere
Secure and power the intelligent edge with Azure SphereSecure and power the intelligent edge with Azure Sphere
Secure and power the intelligent edge with Azure Sphere
 

Similar to Software Protection Relationship Effort Performance

Protecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript ApplicationsProtecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript Applicationsteam-WIBU
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsteam-WIBU
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...NetworkCollaborators
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeNowSecure
 
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Canada
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-howteam-WIBU
 
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...Amazon Web Services
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applicationsteam-WIBU
 
Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)Sqreen
 
A Safer Journey for Java Applications
A Safer Journey for Java ApplicationsA Safer Journey for Java Applications
A Safer Journey for Java Applicationsteam-WIBU
 
Integrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery PipelineIntegrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery PipelineAkamai Developers & Admins
 
Building 12-factor Cloud Native Microservices
Building 12-factor Cloud Native MicroservicesBuilding 12-factor Cloud Native Microservices
Building 12-factor Cloud Native MicroservicesJakarta_EE
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxteam-WIBU
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left SecurityBATbern
 
Building Secure Services using Containers
Building Secure Services using ContainersBuilding Secure Services using Containers
Building Secure Services using ContainersAmazon Web Services
 
Digitally Record videos & Track Incidents on IPAD Application
Digitally Record videos & Track Incidents on IPAD ApplicationDigitally Record videos & Track Incidents on IPAD Application
Digitally Record videos & Track Incidents on IPAD ApplicationMike Taylor
 
Intel software guard extension
Intel software guard extensionIntel software guard extension
Intel software guard extensionDESMOND YUEN
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 

Similar to Software Protection Relationship Effort Performance (20)

Protecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript ApplicationsProtecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript Applications
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environments
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
 
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre security
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-how
 
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
 
Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)
 
A Safer Journey for Java Applications
A Safer Journey for Java ApplicationsA Safer Journey for Java Applications
A Safer Journey for Java Applications
 
Integrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery PipelineIntegrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery Pipeline
 
Building 12-factor Cloud Native Microservices
Building 12-factor Cloud Native MicroservicesBuilding 12-factor Cloud Native Microservices
Building 12-factor Cloud Native Microservices
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
Building Secure Services using Containers
Building Secure Services using ContainersBuilding Secure Services using Containers
Building Secure Services using Containers
 
Digitally Record videos & Track Incidents on IPAD Application
Digitally Record videos & Track Incidents on IPAD ApplicationDigitally Record videos & Track Incidents on IPAD Application
Digitally Record videos & Track Incidents on IPAD Application
 
Intel software guard extension
Intel software guard extensionIntel software guard extension
Intel software guard extension
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
Apigee Edge: Intro to Microgateway
Apigee Edge: Intro to MicrogatewayApigee Edge: Intro to Microgateway
Apigee Edge: Intro to Microgateway
 

More from team-WIBU

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Securityteam-WIBU
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Togetherteam-WIBU
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basicsteam-WIBU
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuitätteam-WIBU
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityteam-WIBU
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenariosteam-WIBU
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practicesteam-WIBU
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses Moreteam-WIBU
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edgeteam-WIBU
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magicteam-WIBU
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisiveteam-WIBU
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...team-WIBU
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesteam-WIBU
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licensesteam-WIBU
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetiteteam-WIBU
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solutionteam-WIBU
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to lastteam-WIBU
 
Safer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integratedSafer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integratedteam-WIBU
 
Managing entitlements through the product lifecycle
Managing entitlements through the product lifecycleManaging entitlements through the product lifecycle
Managing entitlements through the product lifecycleteam-WIBU
 

More from team-WIBU (20)

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Together
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to last
 
Safer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integratedSafer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integrated
 
Managing entitlements through the product lifecycle
Managing entitlements through the product lifecycleManaging entitlements through the product lifecycle
Managing entitlements through the product lifecycle
 

Recently uploaded

(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 

Recently uploaded (20)

(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 

Software Protection Relationship Effort Performance

  • 1. The Effort-Performance Relationship in Software Protection Alvaro Forero | Security Expert alvaro.forero@wibu.com Ruediger Kuegler | Security Expert ruediger.kuegler@wibu.com Virtual CodeMoving with Translocated Execution 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 1
  • 2. Agenda  Overview of CodeMeter Protection Suite  AxProtector  IxProtector  Translocated Execution  Live Demo  Summary – Security 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 2
  • 3. CodeMeter Protection Suite 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 3
  • 4. CodeMeter Protection Suite CodeMeter Protection Suite 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection Automatic Protection (IP Protection) Anti-Debug Methods Used CodeMeter Variant Individual Function Encryption Integrity Protection (Tamper Protection) Authenticity of Software (Secure Loader / Authenticity) Java SE Java EE Embedded Operating System .NETPC (Windows, Linux, macOS) CodeMeter Runtime CodeMeter Runtime CodeMeter Runtime CodeMeter Embedded CodeMeter Embedded IxProtector AxProtector AxProtector .NET AxProtector Java AxProtector CmE ExProtector 4
  • 5. AxProtector 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 5
  • 6. Protected Application AxProtector 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 6 Compiled Application Data Section Resource Section Code Section AxProtector Header Data Section Resource Section Code Section Header Encrypted Code Section Encrypted Data Section Encrypted Resource Section AxEngine (Security Engine)
  • 7. Compiled Application 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 7
  • 8. Protected Application 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 8
  • 9. Security Options 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 9  Resource Encryption  Code modifications  Static  Dynamic  Debugger Checks  Basic  Advanced  Generic  Locking of licenses
  • 10. No Inter-Section Calls (Option –a) 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 10 Protected ApplicationCompiled Application Header AxProtector Header Data Section Resource Section Code SectionCode Section Data Section Resource Section Code SectionEncrypted Code Section Encrypted Data Section Encrypted Resource Section AxEngine (Security Engine)
  • 11. IxProtector 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 11
  • 12. Protected Application AxEngine (Security Engine) Compiled Application IxProtector 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 12 IxProtector Header Data Section Resource Section Code Section Function Function Header Code Section Data Section Resource Section Function Function Encrypted Function Encrypted Function
  • 13. Encrypted Single Function 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 13
  • 14. Encrypted Code Makes No Sense 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 14 Unencrypted Code Encrypted (nonsense) Code
  • 15. Protected Application AxEngine (Security Engine) Compiled Application AxProtector and IxProtector 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 15 AxProtector IxProtector Header Data Section Resource Section Code Section Function Function Header Code Section Data Section Resource Section Function Function Encrypted Function Encrypted Function Encrypted Data Section Encrypted Resource Section Encrypted Code Section Encrypted Function Encrypted Function
  • 16. IxProtector (During Runtime - Standard) 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 16  Start of the application  …  Calling WupiDecryptCodeId(n)  Decrypts function n in place  Executing function n  Calling WupiEncryptCodeId(n)  Encrypts function n in place  … Protected Application Header Code Section Data Section Function Function Encrypted Function Encrypted Function Encrypted Data Section Encrypted Code Section Encrypted Function Encrypted Function Encrypted Resource Section AxEngine (Security Engine)
  • 17. Translocated Execution 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 17
  • 18. Protected ApplicationCompiled Application IxProtector with Translocated Execution 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 18 IxProtector Header Header Code Section Function Function Data Section Resource Section Code Section Data Section Resource Section Function FunctionStub Enc. Function Stub Enc. Function Encrypted Functions AxEngine (Security Engine)
  • 19. Protected ApplicationCompiled Application AxProtector and IxProtector with Translocated Execution 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 19 AxProtector IxProtector Header Data Section Code Section Function Function Header Encrypted Functions Resource Section Code Section Data Section Resource Section Function FunctionStub Enc. Function Stub Enc. Function Encrypted Code Section Stub Enc. Function Stub Enc. Function Enc. Resource Section Encrypted Data Section AxEngine (Security Engine)
  • 20. IxProtector (During Runtime – With Translocated Execution) 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 20  Start of the application  …  Executing function n  Decrypts function n on heap  Jumps to function n  Removes (overrides) function n from heap  …  Next function at the same location Protected Application AxEngine (Security Engine) Header Encrypted Functions Code Section Data Section Stub Enc. Function Stub Enc. Function Encrypted Code Section Stub Enc. Function Stub Enc. Function Encrypted Data Section Heap FunctionFunction Enc. Resource Section
  • 21. Available Options  Automatic (1)  Decryption, Execution, Deletion  Manual (2)  WupiDecryptCodeId, Call, WupiEncryptCodeId  Automatically with cache (5)  Decryption, Execution, Caching  Deletion after x seconds 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 21
  • 22. Demo 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 22
  • 23. Summary – Security 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 23
  • 24. Security  AxProtector decrypts the complete executable when starting the application  Anti-Dumping, Modifications and resource encryption  Prevention of inter-section calls  IxProtector keeps many single functions encrypted in memory  Decryption during runtime on demand  Translocated Execution makes it even harder to detect these functions during runtime  Dynamic and automatic decryption during runtime 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 24
  • 25. Germany: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 http://www.wibu.com info@wibu.com Thank you for your active participation! 06.09.2017 © WIBU-SYSTEMS AG 2017 - The Effort-Performance Relationship in Software Protection 25