Tips and Tricks
Sentinel Hardware Keys Developer’s Guide
149
Attack the Application
Since most software developers do not write security code everyday, this is
often the easiest target. Since a poorly protected application may only
require a few quick changes to operate without the Sentinel Key attached,
hackers might try code patching or fake the application components. Fortu-
nately, by using many of the tips in this chapter this can also be made
extremely difficult. The remaining chapter discusses such methods.
Tips and Tricks
We have provided many tips and tricks you can implement in your
application. Each tip protects against specific type of attack—and multiple
methods will complement each other.
Use Shell to Encrypt Your Executable (For Windows)
For Windows applications, you can combine your API elements-based cus-
tom protection with Shell and add an extra layer of protection. The Shell
encrypts your final executable, which makes it difficult to disassemble or
debug your application.
Even if the attacker manages to overcome the difficult task of removing the
Shell, the application inside is still protected—due to two strong layers of
protection.
Implement Query-Response Protection
The AES algorithm-based query/response protection is the primary method
of securing an application. Simply storing data in the key memory is rela-
tively easier to mimic because once the hacker knows what the memory
should contain, they can modify the application to return those values
instead of actually reading them from the Sentinel Key.
Query-response protection is a
challenge-response like
technique driven by
the AES algorithm programmed in the Sentinel Key. The application sends a
query to the Sentinel Key, which sends a response calculated using the AES
Содержание Sentinel
Страница 1: ...1 2 0...
Страница 6: ...vi Sentinel Hardware Keys Developer s Guide...
Страница 12: ...Contents xii Sentinel Hardware Keys Developer s Guide...
Страница 20: ......
Страница 58: ...Chapter 2 Sentinel Keys SDK Components 40 Sentinel Hardware Keys Developer s Guide...
Страница 80: ...Chapter 3 Planning Application Protection and Licensing Strategy 62 Sentinel Hardware Keys Developer s Guide...
Страница 82: ......
Страница 108: ...Chapter 4 Protecting Applications Using Shell 90 Sentinel Hardware Keys Developer s Guide...
Страница 180: ......
Страница 196: ...Chapter 8 License Grouping 178 Sentinel Hardware Keys Developer s Guide...
Страница 212: ...Chapter 9 Programming Sentinel Hardware Keys 194 Sentinel Hardware Keys Developer s Guide...
Страница 214: ......
Страница 236: ...Chapter 10 Redistributables for Customers and Distributors 218 Sentinel Hardware Keys Developer s Guide...
Страница 252: ...Appendix A Troubleshooting 234 Sentinel Hardware Keys Developer s Guide...
Страница 282: ...Index 264 Sentinel Hardware Keys Developer s Guide...