Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Combine the automatic protection with protection based on the use of API functions
  • Use hardware data encryption algorithms
  • In case of automatic protection of applications use the following options wherever possible:
    • Encryption of the loadable part of application
    • Regular verification of dongle presence
  • In case of APIbased protection:
    • Do not keep the access codes in the application body in an explicit form
    • Use complex algorithms working with API functions
    • Distribute checks about the application code
    • Use various checks with different expectancy
    • Delay the application reaction to return codes of API functions
    • Complicate the logic of processing the return codes

More information: Increasing the tamperproofness of protection.