A study of software protection techniques

7Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Software piracy and tampering is a well known threat the world is faced with. There have been a lot of attempts to protect software from reverse engineering and tampering. It appears as if there is an ongoing war between software developers and crackers, both parties want to get an upper hand over each other as the time passes. Some of the ample techniques of software protection are reviewed, including multi-block hashing scheme, hardware based solutions, checksums, obfuscation, guards, software aging, cryptographic techniques and watermarking. All of these techniques play their parts imparted on them to protect the software from malicious attacks. © 2007 Springer.

Cite

CITATION STYLE

APA

Memon, J. M., Khan, A., Baig, A., & Shah, A. (2007). A study of software protection techniques. In Innovations and Advanced Techniques in Computer and Information Sciences and Engineering (pp. 249–253). Kluwer Academic Publishers. https://doi.org/10.1007/978-1-4020-6268-1_45

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free