Overcoming Trial Version Software Cracking Using a Hybridized Self-Modifying Technique
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Information exchange has become an essential component in modern society. Vendors provide content to consumers, while consumers exchange information using e-mail, peer-to-peer systems, social networks, or other network applications. We rely on embedded software in our cars, the domotics, built into our homes, and other electronic devices on a daily basis. Obviously, all these applications rely on the correct functioning of software and hardware components. Often, software which is the driving force of computer hardware are usually subjected to cracking, a condition whereby hackers bypassing the registration and payments options on a software product to remove copyright protection safeguards or to turn a demo version of software into a fully functioning version by manipulating information such as the serial number, hardware key, dates, etc., without actually paying for the software. In this paper, we proposed a hybridized self-modifying technique for checking against cracking. Our technique combines obfuscation and hashing mechanisms to resist attackers from cracking software. The key idea is to hide the code using hashing by transforming it such that it becomes more difficult to understand the original source code and using obfuscation to resist software reverse engineering. The result shows that our technique is able to block hackers and thus prevent code cracking
Authors and Affiliations
C. K. Oputeh , E. E. Ogheneovo
Managing IoT data using relational schema and JSON fields, a comparative study
Data transmitted from sensors and actuators as part of the Internet of Things (IoT) infrastructure are stored either in database tables following relational schema and normalization forms or in schema less collections us...
A Survey on Brute Force Attack on Open Functionality Secured
The project entitled as Brute Force Attack On Open Functionality Secured is to design and develop the application package for well secured dynamic application. A common threat web developer’s face is a password-guessing...
An Effective Method to Hide Texts Using Bit Plane Extraction
Abstract: The work is to show how simply a data can be hidden inside an image and be easily extracted usingMatlab. The work focuses on bit plane extraction and how it can be used to complete the above mentioned tas...
Selection of Legendre Moments for Content Based Image Retrieval Using ACO Based Algorithm
Abstract : Feature selection is an important step in Content Based Image Retrieval (CBIR) which has a great impact on reducing complexity and increasing efficiency of CBIR frameworks. Swarm Intelligence (SI) methods, as...
Survey Paper on PEGASIS: Energy Conservation in Heterogeneous Environment
Abstract: Wireless sensor network is vast area for research. Because of scarce resources, energy consumption and battery lifetime is crucial aspects in WSN. So with the help of routing protocol, improvement can be...