Yes, new things happened since.
There is a lot of new Anti-temper softwares that appeared in the market, each one with it's own tecnology. some like Arxan and whiteCryption...
Also there is a new anti-temper system called Denuvo that it seems to be almost impossible to reverse engineer.
VMProtect seems to create a virtual processor and run its encrypted code there, this probably have some huge performance loss there, if performance it's not crucial for your code ignore this.
So, there is a lot of options to you to choose, but keep this in mind, every protection program is equal in this: they are not impossible to reverse engineer, so you cant relay only on the protection system to protect your software, some good practices to protect your software are:
- Don't use the "30 days trial" idea, if you want to give a free sample make a demo where the important features are not compiled with it.
- Encrypt the software, make sure that only who bought it has the key to decrypt it.
- Don't let anyone download the full software freely, even if it is encrypted, make sure only the customer can download it.
- Place watermarks on the code, basically have the info of the customer inside the software, so it can be used to know from where the leak happened.
- Make the software bound to the specific machine that it was installed (some anti-tempers may do this)
Some downsides of using Anti-tamper to protect your software are:
- Performance loss (some technologies only hurt the performance non time important functions).
- Increase in size of the executable.
- Increase in memory usage.
- And other that may be program specific..