기업을 위한 IT 전문 파트너
  • Themida x32
  • SNS공유 페이스북 트위터
Themida x32
  • Themida x32
  • 강력한 성능의 역 컴파일/크래킹 방지 솔루션

  • 제조사 : Oreans Technologies Brand Shop
  • 제품번호 : 7416
유사 기능 제품
응용프로그램 보안/보호
 
가격정보
P# OS언어제품구분버전소비자가공급가견적주문
01
113
Win 영문 Single Developer License 현 시점 최적가로 견적을 받아보세요   303,600 284,900 견적요청
02
113
Win 영문 Company License 현 시점 최적가로 견적을 받아보세요   594,000 588,500 견적요청
51
133
Win 영문 Subscription 6 month 현 시점 최적가로 견적을 받아보세요   85,800 77,220 견적요청
52
133
Win 영문 Subscription 12 month 현 시점 최적가로 견적을 받아보세요   172,700 158,400 견적요청
    위 가격은 부가세를 포함한 가격 입니다.
  • 견적 및 주문을 진행하시려면 로그인이 필요합니다.
  • ‘주문’이 활성화 되어 있지 않은 제품은 ‘견적요청’을 해주시면 현 시점 최적가로 제공 해드립니다.
요약정보

강력한 성능의 역 컴파일/크래킹 방지 솔루션

Advanced Windows software protection system, developed for software developers who wish to protect their applications against advanced reverse engineering and software cracking.

Software protectors where created to keep an attacker from directly inspecting or modifying a compiled application. A software protector is like a shield that keeps an application encrypted and protected against possible attacks. When a protected application is going to be run by the operating system, the software protector will first take control of the CPU and check for possible cracking tools ( dissemblers or de-compilers) that may be running on the system. If everything is safe the software protector will proceed to decrypting the protected application and giving it the control of the CPU to be executed as normal.

Themida® uses the SecureEngine® protection technology that, when running in the highest priority level, implements never seen before protection techniques to protect applications against advanced software cracking.

동일계열 제품



상세정보




When an application is being created, the Compiler will compile the application source code into several object files made of machine language code. Then the object files are linked together to create the final executable.



Figure 1: Compilation of your source code

In the same manner that the source code of an application is converted into machine code at compilation time, there are tools that can convert a compiled application into assembly language or a higher programming language. These tools are known as dissemblers and de-compilers.



Figure 2: Decompilation of your application

An attacker can use a dissembler or de-compiler to study how a specific application works and what a specific routine does. When the attacker has a good knowledge of the target application, he can modify the compiled application to alter his behavior. For example, the attacker could bypass the routine that checks for the trial period in an application and make it run forever or even worse, cause the application to behave as if it was registered.




Software protectors where created to keep an attacker from directly inspecting or modifying a compiled application. A software protector is like a shield that keeps an application encrypted and protected against possible attacks. When a protected application is going to be run by the operating system, the software protector will first take control of the CPU and check for possible cracking tools ( dissemblers or de-compilers) that may be running on the system. If everything is safe the software protector will proceed to decrypting the protected application and giving it the control of the CPU to be executed as normal.

The advantages of using a Software Protector are:

  • Protect an application against piracy.
  • Prevents attackers from studying how an application is implemented.
  • Will not allow attackers to modify an application to change its behavior .




Since software protectors were born, many attackers have centered most of their efforts on attacking the software protectors themselves instead of the applications. Many tools have been developed that aid in the attacking of software protectors. These attacks often result in the attacker obtaining the original application that is decrypted and has the protection wrapper removed.



Figure 3: Common software protectors philosophy

The main problem with software protectors is that they use protection techniques very well known by crackers, so they can be easily bypassed with traditional cracking tools.

Another important problem in software protectors is that they have restricted execution by the operating system, that is, they run with normal application privileges. Because of this attackers can use cracking tools that run at the same priority level as the operating system allowing them to fully supervise what a software protector is doing at a certain time and attack it in specific places.




With Themida® , we have centered in the main weakness that software protectors have thus providing a complete solution to overcome those problems. Themida® uses the SecureEngine® protection technology that, when running in the highest priority level, implements never seen before protection techniques to protect applications against advanced software cracking.



Figure 4: Themida® protection procedure

Click here to see all Themida® features.

protection technology that, when running in the highest priority level, implements never seen before protection techniques to protect applications against advanced software cracking.



Figure 4: Themida® protection procedure

Clickhere to see all Themida® features.

SecureEngine® defeats all current cracking tools that can be used against protected applications and it will make sure that your protected applications are only run in safe environments.



Figure 5: SecureEngine® technology adds more strength to the existing protection

Clickhere to learn more about SecureEngine®



Software protection programming is not a very well known field for most programmers. Software protection techniques are not like "visible" features that can be seen and compared. Because of this most software protection authors could talk about impressive techniques that are included deep inside the protection scheme, when many times most of these techniques hardly exist or they are much simpler than what they seem.

Most software protectors reiterate a lot about using very strong cryptographic algorithms like RSA, Elliptic curves and AES hoping that the final user will believe that those protectors and the cryptic algorithms are unbreakable. This if far from the truth as software protection is very different from data protection. Even if a software protector encrypts the protected application with the most robust cryptographic algorithm, sooner or later the protected application needs to be decrypted in order to be run by the CPU. It is in this

ThemidaWin32and.NET,Themidax32, OreansTechnologies,Oreans Technologies
견적요청
인터파크 큐브릿지 IT영업부
자세히보기
  • Office 365
  • CCT
TOP