ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Comparative Analysis of Software Protection Schemes

Journal: The International Arab Journal of Information Technology (Vol.12, No. 3)

Publication Date:

Authors : ; ; ;

Page : 286-295

Keywords : Software tempering; software reversing; cryptography; watermarking; digital rights management.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In the era of software globalization, the need for securing software is much sought to ensure its smooth functioning for continuous availability of services to the users. Particularly, in cloud computing environment, all the software in the cluster needs to be secured and shielded against unauthorized accesses. Software crackers are always in the search of flaws in the software to obtain access to the software functionally by penetrating into the software skeleton. This paper reviews and critically analyzes various software protection techniques, both software-based and hardware-based, that can help control the software piracy issues in order to determine their efficacy and specific use in different environments and scenarios. The software protection techniques explored in this paper include cryptography, software watermarking, secure access scheme, software aging, guards, obfuscation and multi-block hashing techniques. The paper also discusses the taxonomy of the software protection techniques and the probable attack models that can be launched against each technique to evade the protection mechanism.

Last modified: 2019-11-17 18:15:29