11. Hardware for Protecting Software

The focus of this book is on software-based techniques for software protection. The advantage of software-only approaches is exactly that—they require no special hardware to run. This means that your protected program should run everywhere, regardless of the capabilities your customer’s hardware happens to have. The disadvantage is that the code is always available to the attacker to examine and modify. You can make it more difficult for him to do so, using the obfuscation and tamperproofing techniques from previous chapters, but the code is there ready to be attacked, and with the current state of the art, given an adversary with enough tenacity, defenses will eventually be breached.

There have been many ...

Get Surreptitious Software now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.