Can an attacker use a simulator to break the application?

White Hawk Software has means to detect simulators and stop execution of the application. To become dangerous, a simulator would need to be quite complete, including timing and multi-processing.