A Comparative Analysis of Software Protection Schemes
Journal: The International Arab Journal of Information Technology (Vol.12, No. 3)Publication Date: 2015-05-01
Authors : Muhammad Khan; Muhammad Akram; Naveed Riaz;
Page : 286-295
Keywords : Software tempering; software reversing; cryptography; watermarking; digital rights management.;
Abstract
In the era of software globalization, the need for securing software is much sought to ensure its smooth functioning for continuous availability of services to the users. Particularly, in cloud computing environment, all the software in the cluster needs to be secured and shielded against unauthorized accesses. Software crackers are always in the search of flaws in the software to obtain access to the software functionally by penetrating into the software skeleton. This paper reviews and critically analyzes various software protection techniques, both software-based and hardware-based, that can help control the software piracy issues in order to determine their efficacy and specific use in different environments and scenarios. The software protection techniques explored in this paper include cryptography, software watermarking, secure access scheme, software aging, guards, obfuscation and multi-block hashing techniques. The paper also discusses the taxonomy of the software protection techniques and the probable attack models that can be launched against each technique to evade the protection mechanism.
Other Latest Articles
- A Hierarchical Approach to Improve Job Scheduling and Data Replication in Data Grid
- Novel Approaches for Scheduling Task Graphs in Heterogeneous Distributed Computing Environment
- Multi Dimensional Taxonomy of Bio-inspired Systems Based on Model Driven Architecture
- Anomaly Traffic Detection Based on PCA and SFAM
- Efficient English Auction Scheme without a Secure Channel
Last modified: 2019-11-17 18:15:29