KEYnote 35 English - Spring 2018 | Page 11

Header Stub Code (without Intellectual Property) CodeMoving Encrypted Code The optimum in protection is achieved by moving the code into the CmDongle and exe- cuting it in that safe environment. This makes it completely impossible for hackers to know what is going on. Encrypted Resources AxEngine (Security Engine) Protected Application Protected Application testing suites and would not have to continue to earn a meager living by hacking software. Copy protection and licensing must get to work where they are needed in the code. One typical strategy would be to create a license wrapper class, but calling on that class repeat- edly would be counterproductive: Hackers would only have to a