
Resources
Explore DEXAIM DMA's in-depth technical resources. Find detailed specifications, crucial FPGA resource data (35T vs 100T), advanced firmware guides, and more for maximum performance.
Firmware
35T vs 100T
The 100T is preferred for security because the extra resources allow the firmware to implement features that specifically target and counteract anti-cheat detection methods:

More Realistic Emulation: Anti-cheat software often checks for a card's "digital footprint," like its PCI Configuration Space and how it responds to requests. The 100T has enough logic to run a full, detailed emulation of a common, legitimate device (like a high-end network adapter) that includes complex logic for handling interrupts and error reporting that the anti-cheat expects to see.
Sophisticated Obfuscation: The larger chip provides room to implement advanced techniques that randomize or obfuscate the timing and structure of the DMA operations. This prevents simple Signature Matching (detecting known bad firmware) and makes Behavioral Analysis (detecting suspicious activity) much more difficult.
Future-Proofing: As anti-cheat technology evolves to scan for more complex characteristics, a larger chip provides headroom for developers to create new, updated firmware that can bypass the latest detection methods without being resource-constrained.
While a well-written, highly-optimized firmware on a 35T can achieve a good level of stealth, the 100T offers the best platform for the most complex, customized, and therefore most secure DMA solutions.
The reason you hear about detection, especially on the more common 35T models, is because anti-cheat software often works by:
Signature Matching: Detecting specific, known firmware patterns (heuristics). If a common 35T card ships with a widely-used firmware, it becomes an easy target for a ban wave.
Behavioral Analysis: Monitoring the data and memory access patterns that look unusual for the device being emulated. More complex, custom firmware can better hide these patterns.
Hardware and Configuration Checks: Examining the PCIe configuration space and device IDs for known malicious devices.
So, while the 35T offers a more budget-friendly entry, the 100T is often favored for its ability to host the more complex and unique firmware designs that are generally considered harder to detect.
Impact on Firmware (FW) Complexity: Less space means developers are more constrained in how much logic they can implement. To avoid detection, a DMA card's firmware often needs to emulate a standard, legitimate device (like a network or sound card) as closely as possible, which requires a substantial amount of complex logic.
On a 35T, the developer may have to strip down the emulation to fit the space, which could leave the firmware with behavioral patterns or digital "signatures" that are easier for anti-cheat software to flag as non-standard or known-malicious.
Last updated

