Hackers Reverse Engineering Uncovered - Latest hacking strategies unveiled for best in class protection systems

Published: Oct. 9, 2013, 2 p.m.

We all know that in order to defend ourselves from burglars we need safety doors and alarm systems. But what happens if their installation is left to unskilled craftsmen? The same analogy can be extended to the world of software protection.Wibu-Systems has dedicated 25 years to refine the best practices that can allow Independent Software Vendors and Original Equipment Manufacturers to protect their intellectual and business assets.

Given the multiplying attempts of hacking, it is essential to implement software protection in an optimal way. This process is the key to make sure no duplicated copy of your licenses is ever used without your authorization, no manipulation of your code is ever made possible, no reverse-engineering is ever allowed.

During this presentation you will learn how to uncover reverse engineering attacks; we will specifically navigate you through:

  • Simple software protection API call in .NET
  • Implementation of critical parts as unmanaged code
  • Use of Authenticode signatures
  • Use of obfuscation techniques
  • How to hide function calls with reflection
  • Protection data with encryption API
  • Encryption of executable code

In the second part of the presentation we will focus on AxProtetcor .NET and IxProtector .NET from Wibu-Systems, and more specifically on:

  • Basic principles of code encryption with AxProtector and IxProtector
  • Performance vs. Paranoia: how to fine-tune your application
  • Integration of features-on-demand
  • Source code queries and selection with attributes
  • Examples of traps to lock the license
  • How to handle license error messages with routines of your own

Software protection is a particularly delicate process which requires an extended knowledge of all tools and technologies available, a strategic approach, and the fine tuning of the protective measures you have selected. Take the necessary time to go through the entire process with care and be ready to review it as the market space evolve and hackers becomes more canning.