A Thorough Investigation on Software Protection Techniques against Various Attacks
Journal: Bonfring International Journal of Software Engineering and Soft Computing (Vol.02, No. 3)Publication Date: 2012-09-30
Authors : N. Sasirekha; Dr.M. Hemalatha;
Page : 10-15
Keywords : Code Block Encryption; Code Obfuscation; Integrity Verification Kernels; Piracy; Reverse Engineering; Software Watermarking; Tampering;
Abstract
Software security and protection plays an important role in software engineering. Considerable attempts have been made to enhance the security of the computer systems because of various available software piracy and virus attacks. Preventing attacks of software will have a huge influence on economic development. Thus, it is very vital to develop approaches that protect software from threats. There are various threats such as piracy, reverse engineering, tampering etc., exploits critical and poorly protected software. Thus, thorough threat analysis and new software protection schemes, needed to protect software from analysis and tampering attacks becomes very necessary. Various techniques are available in the literature for software protection from various attacks. This paper analyses the various techniques available in the literature for software protection. The functionalities and the characteristic features are various software protection techniques have been analyzed in this paper. The main goal of this paper is to analyze the existing software protection techniques and provide directions to overcome the drawbacks of the existing techniques.
Other Latest Articles
- Identification of the Most Affecting Factor and the Most Income Range of the Affected Middle Class Family by Using Fuzzy Matrix
- Transient Free Convective Flow over a Vertical Cone Embedded in a Thermally Stratified Medium
- Methodology of Privacy Preserving Data Publishing by Data Slicing
- A COMPREHENSIVE STUDY ON THE NATURAL PLANT PHENOLS: PERCEPTION TO CURRENT SCENARIO
- DEVELOPMENT OF FPGA MICROBLAZE PROCESSOR AND GSM BASED HEART RATE MONITORING SYSTEM
Last modified: 2013-09-27 16:10:39