Fusion

Automated application protection tool designed to prevent code from being modified or used in unintended ways

Highlights

  • Uses code hardening, anti-tamper, and obfuscation
  • Provides high security by blending your binary with protection technology at build time
  • Results in a unique, per-product, per-build fusing so that every binary is thoroughly and uniquely protected
  • Features an automated system that applies protection in a manner that is sensitive to the performance of the target software. This system is "trained" by running special profiling builds.
  • Ensures that fusion-protected binaries are extremely time-consuming to attack

Description

PACE Fusion prevents reverse engineering and stops hackers from manipulating your code for their own benefit. Fusion is an automated binary and runtime protection tool that protects your code from being analyzed, lifted, modified, or otherwise used by hackers in ways you have not intended. The tool provides a high level of security while being easy to apply and has a negligible impact on your software's performance.

Binary and runtime protection

Fusion provides multilayered binary and runtime protection, defending your software from reverse engineering and manipulation even when it is not connected to the internet.

Control flow obfuscation

Fusion control flow obfuscation defends against static analysis by making code hard to read. Fusion changes the structure of the code without changing how it behaves, making it extremely difficult for an attacker to understand the logic of the code blocks and determine how the blocks are interconnected.

Anti-debug

Fusion provides defenses against software and hardware breakpoints.

Anti-tamper network

Fusion builds a complex network of thousands of unique checks within your software. The interwoven nature of the network means an attacker needs to disable all the checks before they can successfully modify the software—an impractical and time-consuming challenge.

The risks Fusion defends against include:

IP theft: Attackers and unscrupulous competitors reverse engineer software to learn its secrets or simply lift the code wholesale to use in unlicensed deployments.

Lost revenue and competitive advantage: Monetizing IP and staying ahead of competitors becomes significantly harder once proprietary logic is exposed.

Disabled security controls: Modifying software enables attackers to disable security controls, increasing the risk of code poisoning and adversarial attacks.

Reduced valuation: Companies subject to a cyberattack often see a decline in customer trust and a corresponding drop in valuation. Similarly, if a company is monetizing its IP, any IP leak will reduce its market value.

Fusion protects MATLAB® Compiler™ applications, MATLAB Coder™ generated C++ applications, and MEX files from tampering or reverse engineering. Developers can use MATLAB Coder™ to create C++ code for essential functions in their MATLAB applications. After generating MEX files, Fusion will protect the MEX binaries, adding robust anti-tamper features. Then, the protected MEX binaries can be called by the MATLAB applications. The process can also be used to protect MATLAB Coder output that is consumed by other software applications and libraries.

Additional Resources:

pace

PACE Anti-Piracy

PO Box 8298
San Jose, CA 95155-8298
UNITED STATES
Tel: 408-377-9774
sales@paceap.com
https://paceap.com

Required Products

Recommended Products

Platforms

  • Macintosh
  • Windows

Support

  • E-mail

Product Type

  • Lifecycle Management Software

Tasks

  • Desktop, Web and Enterprise Deployment

Industries

  • Automotive
  • Financial Services
  • Industrial Automation and Machinery
  • Software and Internet