Categories
Problems that solves
Shortage of inhouse software developers
Shortage of inhouse IT resources
High costs of IT personnel
Shortage of inhouse IT engineers
Values
Reduce Costs
Enhance Staff Productivity
White Hawk Software NEST-X86™
NEST-X86 tamper-proofs Win32 object files. We analyze and modify the object file for the protection
About Product
Description
NEST-X86 tamper-proofs Win32 object files. We analyze and modify the object file for the protection. Some competitors use the source code; others use executables; many tools are applied to byte codes. Protecting real object files is a major advantage.
Compared to protecting at the source level, operating at the binary level allows the whole complexity of the real computer to be used. The protection is not limited to what the programming language can (nicely) express. Compared to executable files, object files still have unresolved references, but exactly because they still support linking object files lead to more precise analysis. Our tool supports “pre-linking” multiple object files and can generate one single pre-linked and protected object file.
What can be protected?
Protecting object files enables use of different languages or tools. However, being able to precisely analyze the application-binaries does require the protection tool to have some knowledge of the tool chain. C is supported, C++ still has some limitations (templates). The tool will also be able to protect embedded applications.
Control of performance impact.
The protection is guided by a “script”, and by optional position markers in the source file. The script is an XML file, uses only simple elements which any programmer can put together with an XML editor or a plain text editor. The programmer has the choice for the level of protection and which parts of the code will be protected. With this choice, the execution performance, size impact and protection strength can be controlled and the protection applied where it is most needed and most critical.