Wibu-Systems announces results of Blurry Box hacker's contest | Automation.com

Wibu-Systems announces results of Blurry Box hacker's contest

Wibu-Systems announces results of Blurry Box hacker's contest

June 27, 2017 – Hundreds of participants from all corners of the globe took part in a hackers contest aimed at cracking a game protected with Blurry Box, the encryption software recently launched by Wibu-Systems. The outcome: No one could break the latest software protection technology introduced by the provider of secure license management.

The contestants tried frantically for three weeks; two of them submitted their results to the independent jury consisting of IT security scientists from the Horst Goertz Institute (HGI) and the Institute for Internet Security - if(is). Their exploits were proven to be not correct, resulting in a voluntary award of €1,000 each against the total sum of €50,000 that was originally at stake for a complete hacking solution. Instead, it will go towards further research and development.

Wibu-Systems has been focusing on the protection of digital know-how for almost thirty years, leading to the birth of CodeMeter, its flagship solution for safeguarding software publishers and intelligent device manufacturers from intellectual property piracy, product counterfeiting, software reverse engineering, and code tampering. One of the essential components of CodeMeter is its encryption mechanism: The AxProtector module encrypts the compiled software in a fully automated fashion; the IxProtector module, later integrated in AxProtector, extracts and encrypts individual functions for higher protection against typical cracking techniques.

Still, some complex and sensitive software need stronger protections. In 2014, Wibu-Systems, the Karlsruhe Institute of Technology, and the


research center FZI took the first prize at the German IT Security Awards for Blurry Box. Since then, the encryption scheme has been integrated into CodeMeter and is now publicly validated through the global challenge. It extracts, duplicates, modifies, and encrypts individual functions, selects variants, and takes the flow of the program into consideration. Traps and decryption delays stop brute force attacks.

Prof. Dr. Norbert Pohlmann, one of the contest jurors and Director for Internet Security at if(is), adds "In my mind, it is a great idea that developers let ‘hackers’ take on their products in a public competition. It gives us transparency about how secure and trustworthy they are, and the contest is a great opportunity for the participants to learn about IT security."

MORE INDUSTRY NEWS

VIEW ALL

RELATED