A Study of Software Protection Techniques
Autor: | Amber Baig, Asma Khan, Jan M. Memon, Asadullah Shah |
---|---|
Rok vydání: | 2007 |
Předmět: |
Reverse engineering
Computer science business.industry ComputingMilieux_LEGALASPECTSOFCOMPUTING computer.software_genre Computer security Obfuscation (software) Software Software security assurance Software deployment Software construction Software verification and validation Software aging business computer |
Zdroj: | Innovations and Advanced Techniques in Computer and Information Sciences and Engineering ISBN: 9781402062674 |
DOI: | 10.1007/978-1-4020-6268-1_45 |
Popis: | Software piracy and tampering is a well known threat the world is faced with. There have been a lot of attempts to protect software from reverse engineering and tampering. It appears as if there is an ongoing war between software developers and crackers, both parties want to get an upper hand over each other as the time passes. Some of the ample techniques of software protection are reviewed, including multi-block hashing scheme, hardware based solutions, checksums, obfuscation, guards, software aging, cryptographic techniques and watermarking. All of these techniques play their parts imparted on them to protect the software from malicious attacks. |
Databáze: | OpenAIRE |
Externí odkaz: |