Wibu-Systems: unbreakable software protection technology
Hundreds of participants from all corners of the globe have taken part in a hackers contest aimed at cracking a game protected with Blurry Box, the pinnacle of encryption recently launched by Wibu-Systems. The outcome: No one could break the latest software protection technology introduced by the leading provider of secure license management in the industrial world.
The contestants tried frantically for three weeks; two of them submitted their results to the independent jury consisting of IT security scientists from the Horst Goertz Institute (HGI) and the Institute for Internet Security - if(is). Their exploits were proven to be not correct, resulting in a voluntary award of €1,000 each against the total sum of €50,000 that was originally at stake for a complete hacking solution. Instead, it will go towards further research and development. Wibu-Systems has been focusing on the protection of digital know-how for almost thirty years, leading to the birth of CodeMeter, its flagship solution for safeguarding software publishers and intelligent device manufacturers from intellectual property piracy, product counterfeiting, software reverse engineering, and code tampering. One of the essential components of CodeMeter is its encryption mechanism: The AxProtector module conveniently encrypts the compiled software in a fully automated fashion; the IxProtector module, later integrated in AxProtector, extracts and encrypts individual functions for higher protection against typical cracking techniques. Still, some complex and sensitive software need stronger protections. In 2014, Wibu-Systems, the Karlsruhe Institute of Technology, and the research center FZI took the first prize at the German IT Security Awards for Blurry Box. Since then, the encryption scheme has been integrated into CodeMeter and is now publicly validated through the global challenge. It extracts, duplicates, modifies, and encrypts individual functions, selects variants, and takes the flow of the program into consideration. Traps and decryption delays stop brute force attacks. With such a robust design, hackers would have an easier time rebuilding the software protected with Blurry Box from scratch.