Chapter 3 – Planning Application Protection and Licensing Strategy
46
Sentinel Hardware Keys Developer’s Guide
Shell also provides the following security options that you can choose while
adding a Shell feature (steps are provided in Chapter 4, “Protecting Applica-
tions Using Shell,” on page 65):
■
Multi-layered Protection
The Shell provides multi-layered protection. Since the joint between
an application and the Shell layers is vulnerable to attacks, you can
choose the number of layers the Shell uses to protect your application,
from level 1 to 5. Level 1 provides reasonable protection and level 5
provides the most protection. However, with each level of protection
added, the size of the application and the time it takes to start up also
increases. By default, level 3 multi-layering is used.
■
Anti-debugging Protection
The Shell is capable of detecting debuggers, like SoftICE and OllyDbg.
It can also provide reasonable protection against break-points
targeted at important functions. You can choose to deny application
execution in the presence of debuggers. The protected application will
exit if a debugger is detected on a system. Non-malicious users will
close the debugger and start the application again. Otherwise, you
may even allow your application to run in the presence of debuggers.
■
Anti-reverse Engineering Protection
Using the Shell SDK module, you can protect your important code
fragments, strings, and constants for Visual C, Visual BASIC, and
Delphi. Refer to the readme available under the
<installdir>\Sentinel
Keys Toolkit\Shell SDK
folder for more details.
Note:
The Shell SDK support is provided only for Windows 32-bit executables and
DLLs.
■
Anti-dumping Protection
Shell provides protection against a memory dump of the protected
application. You need to select the
Hide import symbols
check box
(under the
Security
tab of
Add/Edit Shell Feature
dialog box) to
enable this added protection.
Содержание Sentinel
Страница 1: ...1 2 0...
Страница 6: ...vi Sentinel Hardware Keys Developer s Guide...
Страница 12: ...Contents xii Sentinel Hardware Keys Developer s Guide...
Страница 20: ......
Страница 58: ...Chapter 2 Sentinel Keys SDK Components 40 Sentinel Hardware Keys Developer s Guide...
Страница 80: ...Chapter 3 Planning Application Protection and Licensing Strategy 62 Sentinel Hardware Keys Developer s Guide...
Страница 82: ......
Страница 108: ...Chapter 4 Protecting Applications Using Shell 90 Sentinel Hardware Keys Developer s Guide...
Страница 180: ......
Страница 196: ...Chapter 8 License Grouping 178 Sentinel Hardware Keys Developer s Guide...
Страница 212: ...Chapter 9 Programming Sentinel Hardware Keys 194 Sentinel Hardware Keys Developer s Guide...
Страница 214: ......
Страница 236: ...Chapter 10 Redistributables for Customers and Distributors 218 Sentinel Hardware Keys Developer s Guide...
Страница 252: ...Appendix A Troubleshooting 234 Sentinel Hardware Keys Developer s Guide...
Страница 282: ...Index 264 Sentinel Hardware Keys Developer s Guide...