We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

An Improved Secured Client Authentication to Protect Software against Piracy

by G. Syam Prasad, G. Samuel Vara Prasad Raju
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 17
Year of Publication: 2013
Authors: G. Syam Prasad, G. Samuel Vara Prasad Raju
10.5120/13962-1850

G. Syam Prasad, G. Samuel Vara Prasad Raju . An Improved Secured Client Authentication to Protect Software against Piracy. International Journal of Computer Applications. 79, 17 ( October 2013), 18-25. DOI=10.5120/13962-1850

@article{ 10.5120/13962-1850,
author = { G. Syam Prasad, G. Samuel Vara Prasad Raju },
title = { An Improved Secured Client Authentication to Protect Software against Piracy },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 17 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 18-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number17/13962-1850/ },
doi = { 10.5120/13962-1850 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:53:16.017501+05:30
%A G. Syam Prasad
%A G. Samuel Vara Prasad Raju
%T An Improved Secured Client Authentication to Protect Software against Piracy
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 17
%P 18-25
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Software protection and security plays a vital role to the business and commercial organizations. Various techniques has been proposed to enhance the security of the client's system to authenticate the software against piracy protection. Various software attacks like hardware cloning, software cloning ,software cracking, virus scripts provides high influence on economic development. So it is necessary to develop an enhanced framework to protect software systems against piracy. Existing approaches provide solutions against using smart cards or internet based secured user authentication mechanisms. Existing literature work mainly provides solutions to software piracy against different attacks. But existing approaches doesn't protect software's through reverse engineering or hardware cloning threats. This paper proposed a framework which can be used to protect piracy against hardware piracy. Experimental results shows proposed approach provides better software protection against existing smart card based techniques.

References
  1. Virtual Leashing: Internet-Based Software Piracy Protection Ori Dvir
  2. Protecting Software Codes By Guards Hoi Chang, Mikhail J. Atallah.
  3. Collberg C. S. and Thomborson C. , "Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection", IEEE Transactions on Software Engineering, Vol. 28, Issue 8, Pp. 735 – 746, 2002.
  4. Protecting against piracy: Building Tamper resistant software By Amodha Wijekoon
  5. Hongxia Jin and Lotspiech J. , "Forensic analysis for tamper resistant software", 14th International Symposium on Software Reliability Engineering, 2003.
  6. B. Pinkas and T. Sander, ?Securing passwords against dictionary at-tacks,? inCCS '02: Proc. 9th ACM Conf. Computer Communications Security, New York, 2002, pp. 161–170, ACM.
  7. Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, and Koen De Bosschere "Toward Tamper Resistant Code Encryption: Practice and Experience," LNCS, Vol. 4991, Pp. 86-100, 2008.
  8. Jan Cappaert, Nessim Kisserli, Dries Schellekens and Bart Preneel "Self-Encrypting Code to Protect Against Analysis and Tampering," 1st Benelux Workshop Inf. Syst. Security, 2006.
  9. A Thorough Investigation on Software Protection Techniques against Various Attacks N. Sasirekha.
Index Terms

Computer Science
Information Sciences

Keywords

Software Protection Authentication Hashing Internet Piracy.