A Study of Software Protection Techniques

Autor: Amber Baig, Asma Khan, Jan M. Memon, Asadullah Shah
Rok vydání: 2007
Předmět:
Zdroj: Innovations and Advanced Techniques in Computer and Information Sciences and Engineering ISBN: 9781402062674
DOI: 10.1007/978-1-4020-6268-1_45
Popis: Software piracy and tampering is a well known threat the world is faced with. There have been a lot of attempts to protect software from reverse engineering and tampering. It appears as if there is an ongoing war between software developers and crackers, both parties want to get an upper hand over each other as the time passes. Some of the ample techniques of software protection are reviewed, including multi-block hashing scheme, hardware based solutions, checksums, obfuscation, guards, software aging, cryptographic techniques and watermarking. All of these techniques play their parts imparted on them to protect the software from malicious attacks.
Databáze: OpenAIRE