Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Illegal use of software due to its piracy has been an issue for several years. Software piracy causes other issues such as non-retention of genuine software, violation of the license, and excessive use of the use period. These issues adversely affect the software market and industry. Several studies have been studied to analyze the weaknesses of the existing software copyright protection technologies, such as license authentication, obfuscation, and watermarking, for ameliorating these adverse impacts, revitalizing the software market and industry, and improving safety of software copyrights. However, the existing types of software protection technologies very are diverse, and they have different vulnerabilities even applied the same protection technology. We analyzed and demonstrated the vulnerability of the software protection technology of software C. Further, we proposed a more effective and overall security improvement method for software copyright protection technologies.

Cite

CITATION STYLE

APA

Lee, J., Yim, K., & Lee, K. (2022). Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C. In Lecture Notes in Networks and Systems (Vol. 279, pp. 59–66). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-79728-7_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free