Guardant’s automatic protection supports 32-bit Windows applications and is designed for processing the executable files of Native applications (*.exe), as well as .NET assemblies (*.exe, *.dll).

  1. The automatic protection can be set on the application only upon with the presence of the required dongle in the port!
  2. Despite its rich capabilities, autoprotection cannot guarantee the highest software security. For this reason we strongly recommend increasing protection using Guardant API! 

Guardant’s autoprotection tools consist of several console utilities (a utility for protecting Nativeapplications and two separate utilities for the obfuscation and protection of .NET code assemblies) as well as GUI utilities:

Autoprotection UtilitiesFunction
FilenameType
NwKey32.exeConsoleNative executables protection
CodeObfuscator.exe.NET obfuscation and string encryption
CodeProtect.exe.NET obfuscation and string encryption
LicenseWizard.exeGUIAutoprotection and licensing wizard (Native & .NET)
NativeProfilerGUI.exeNative profiler
NativeProfilerGUI.exe.NET profiler

Protection mechanisms for Native applications and .NET assemblies have significant differences; therefore we will consider them separately:


 Guardant automatic protection has a wide range of features:

Autoprotection FeaturesWin32 apps
Native executables (*.exe).NET assemblies (*.exe, *.dll)
Local dongles support++
Network dongles support++
GSII64 and AES hardware algorithm support++
Protection without binding to a dongle++
Dongle ID verification++
Application serial number and version verification++
Binding many applications to the same dongle++
Multi-module applications protection++
Limiting the application's operating time+-
Limiting the number of application launches+-
Verifying the dongle presence periodically  +-
Controlling USB Dongle’s Presence+-
Protecting imported functions+-
Encryption and packing application fragments+-
.NET string encryption-+
.NET obfuscation-+
.NET MSIL code encryption-+


Guardant dongle is a highly effective mean of software/hardware protection. It allows building protection of virtually any level of complexity and tamperproofness.

Native-application (Win32)

Use automatic protection utilities for protecting ready-to-use applications against the attempts to learn their operating logic. To ensure proper protection it is recommended to use the following options:

If the use of /RIP_CODE and /IMPORT_HOOK options significantly slows down the work of the application, it is recommended to use /RIP_CODE_LIST and /IMPORT_HOOK_LIST options for optimizing the speed of the protected application.

In the event when the tie is done to Sign or Time dongle use ECC160 asymmetric algorithm operating option. Whereas, random data will be generated and signed by a digital signature on elliptic curves directly in the dongle in the course of operating the protected application. Later the signature will be verified by Guardant API function, protected by pseudo code, traffic encryption and other protection mechanisms.

 


.NET applications (Framework 2.0 – 4.0)

Use the symbol obfuscator and MSIL-code protection utility. It is also reasonable to use the following options:

 

You have to remember the following when using the MSIL-code automatic protection utility: