...
- Combine the automatic protection with protection based on the use of API functions
- Use hardware data encryption algorithms
- In case of automatic protection of applications use the following options wherever possible:
- Encryption of the loadable part of application
- Regular verification of dongle presence
- In case of APIbased protection:
- Do not keep the access codes in the application body in an explicit form
- Use complex algorithms working with API functions
- Distribute checks about the application code
- Use various checks with different expectancy
- Delay the application reaction to return codes of API functions
- Complicate the logic of processing the return codes
More information: Increasing the tamperproofness of protection.