Top.Mail.Ru

Solution for licensing and protection of 32-bit
and 64-bit applications

The companies and individual developers may need protection and licensing for both 32-bit and 64-bit applications from a unified database of keys. The technology used in ASProtect, do not allow this, because it uses two independent bases for ASProtect 32 and APSrotect 64. We propose to consider for this task a different product – StarForce ProActive.

Comparison Table


Features

ASProtect 32

ASProtect 64

StarForce ProActive

Support both 32-bit and 64-bit in one project no no yes
Support for. NET-applications no yes yes
Protecting application data files no no yes

DRM Functions

Manual licensing yes yes yes
Automatic license activation via StarForce Server no no yes
Binding to computer hardware yes yes yes
Computer Hardware Code generation without API integration no yes yes
Binding to a local server no no yes
Activation statistics monitoring via StarForce Web Site no no yes

Protective Mechanisms

Detection of user-mode debugging tools (ring3) yes yes yes
Detection of system debugging tools (ring0) no yes yes
Detection of PC virtualization no yes yes
Detection of running by remote accounts no yes yes
Application code protection Fragments of application functions Function entirelyYou don’t need to modify the application - it is enough a .pdb-file to select the functions. Function entirelyYou don’t need to modify the application - it is enough a .pdb-file to select the functions.
Automatic global code protection no Yes (protection of transitions)It helps to further improve the protection of the file, especially if you cannot edit its source code. Yes (protection of transitions)It helps to further improve the protection of the file, especially if you cannot edit its source code.
Type of code protection Polymorphic obfuscator (replacing with equivalent commands, adding insignificant) Conversion to secure Virtual Machine commandsProtected code is converted into a special internal format, reliably protected from analysis. Conversion to secure Virtual Machine commandsProtected code is converted into a special internal format, reliably protected from analysis.
An option to adjust the level of protection no Yes, selecting the desired ratio between security and performanceIt allows the flexibility to specify the level of protection for individual functions. Yes, selecting the desired ratio between security and performanceIt allows the flexibility to specify the level of protection for individual functions.
The level of protection for the core (from analysis and reverse engineering) Medium High Very highIt uses a unique code architecture that is virtually impossible to analyze using traditional debuggers and disassemblers.
Continuous verifications of the core integrity no yesIt allows to track attempts to interfere in the operation of the protection. yesIt allows to track attempts to interfere in the operation of the protection.
Unique protection core for each file no yesWhen you protect a file it gets a unique assembly of the core. A hacker needs to analyze each file separately. yesWhen you protect a file it gets a unique assembly of the core. A hacker needs to analyze each file separately.

Interface

Multilingual support no yes yes
Customization of standard dialogs no yes yes
Custom web interface no no yes

Learn more about StarForce ProActive

Partners