A Thorough Investigation on Software Protection Techniques against Various Attacks

Abstract

Software security and protection plays an important role in software engineering. Considerable attempts have been made to enhance the security of the computer systems because of various available software piracy and virus attacks. Preventing attacks of software will have a huge influence on economic development. Thus, it is very vital to develop approaches that protect software from threats. There are various threats such as piracy, reverse engineering, tampering etc., exploits critical and poorly protected software. Thus, thorough threat analysis and new software protection schemes, needed to protect software from analysis and tampering attacks becomes very necessary. Various techniques are available in the literature for software protection from various attacks. This paper analyses the various techniques available in the literature for software protection. The functionalities and the characteristic features are various software protection techniques have been analyzed in this paper. The main goal of this paper is to analyze the existing software protection techniques and provide directions to overcome the drawbacks of the existing techniques.

Authors and Affiliations

Sasirekha N, Dr. M. Hemalatha

Keywords

Related Articles

A New Approach to Single Phase AC Microgrid System Using UPQC Device

A single phase AC microgrid system with Unified Power Quality Conditioner (UPQC) and renewable energy source (solar) is combined with minimum number of buses which are interconnected in our system. The UPQC controller is...

Parallel and Multiple E-Data Distributed Process with Progressive Duplicate Detection Model

In present, duplicate detection methods need to process ever larger datasets in ever shorter time: It is difficult to maintain the dataset. This project presents progressive duplicate detection algorithm that gradually i...

Simulation of Dynamic Load Balancing Algorithms 

Cloud computing is a new technology which uses virtual machines instead of physical machines to host, store and network different components. Load balancing is a methodology to distribute workload across multiple compute...

Enhanced on Data Encryption Standard for Secured Cloud Storage

Present days many users store their significant data in cloud. To ensure that the security of the cloud stored data users need to encrypt the important data. The point of data security which has always been noteworthy as...

Topic Categorization based on User behaviour in Random Social Networks Using Firefly Algorithm

During an intercommunication period in social network participants either upgrade the interest in a topic through their positive inputs, catchy comments, tag lines or they simply do not show any interest. The activity of...

Download PDF file
  • EP ID EP98432
  • DOI 10.9756/BIJSESC.10030
  • Views 146
  • Downloads 0

How To Cite

Sasirekha N, Dr. M. Hemalatha (2012). A Thorough Investigation on Software Protection Techniques against Various Attacks. Bonfring International Journal of Software Engineering and Soft Computing, 2(3), 10-15. https://europub.co.uk./articles/-A-98432