A Survey on Software Protection Techniques against Various Attacks

α
N.Sasirekha
N.Sasirekha
σ
Dr.M.Hemalatha
Dr.M.Hemalatha
α Bharathiar University Bharathiar University

Send Message

To: Author

A Survey on Software Protection Techniques against Various Attacks

Article Fingerprint

ReserarchID

VLR82

A Survey on Software Protection Techniques against Various Attacks Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Software security and protection plays an important role in software engineering. Considerable attempts have been made to enhance the security of the computer systems because of various available software piracy and virus attacks. Preventing attacks of software will have a huge influence on economic development. Thus, it is very vital to develop approaches that protect software from threats. There are various threats such as piracy, reverse engineering, tampering etc., exploits critical and poorly protected software. Thus, thorough threat analysis and new software protection schemes, needed to protect software from analysis and tampering attacks becomes very necessary. Various techniques are available in the literature for software protection from various attacks. This paper analyses the various techniques available in the literature for software protection. The functionalities and the characteristic features are various software protection techniques have been analyzed in this paper. The main goal of this paper is to analyze the existing software protection techniques and develop an efficient approach which would overcome the drawbacks of the existing techniques.

References

30 Cites in Article
  1. C Collberg,C Thomborson (2002). Watermarking, tamper-proofing, and obfuscation -tools for software protection.
  2. T Ogiso,U Sakabe,M Soshi,A Miyaji (2002). Software Tamper Resistance Based on the Difficulty of Interprocedural Analysis.
  3. R Srinivasan,P Dasgupta,V Iyer,A Kanitkar,S Sanjeev,J Lodhia (2010). A Multi-factor Approach to Securing Software on Client Computing Platforms.
  4. Jin Hongxia,J Lotspiech (2003). Forensic analysis for [Presented a code block encryption approach to protect software using a key chain tamper resistant software.
  5. Matias Madou,Bertrand Anckaert,Patrick Moseley,Saumya Debray,Bjorn De Sutter,Koen De Bosschere (1996). Software Protection Through Dynamic Code Mutation.
  6. H Chang,M Atallah (2001). Protecting software codes by guards.
  7. B Horne,L Matheson,C Sheehan,R Tarjan Dynamic Self-Checking Techniques for Improved Tamper Resistance.
  8. Yuqun Chen,Ramarathnam Venkatesan,Matthew Cary,Ruoming Pang,Saurabh Sinha,Mariusz Jakubowski (2002). Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.
  9. Jun Ge,Soma Chaudhuri,Akhilesh Tyagi (2005). Control flow based obfuscation.
  10. Yongdong Wu (2009). Enhancing Security Check in Visual Studio C/C++ Compiler.
  11. J Cappaert (2008). Toward Tamper Resistant Code Encryption: Practice and Experience.
  12. J Cappaert (2006). Self-Encrypting Code to Protect Against Analysis and Tampering.
  13. D Jung,H Kim,J Park (2008). A Code Block Cipher Method to Protect Application Programs From Reverse Engineering.
  14. B Birrer,R Raines,R Baldwin,B Mullins,R Bennington (2007). Program Fragmentation as a Metamorphic Software Protection.
  15. Song-Kyoo Kim (2009). Design of enhanced software protection architecture by using theory of inventive problem solving.
  16. Zeng Min,Liu Qiong-Mei,Wang Cheng (2010). Practices of agile manufacturing enterprise data security and software protection.
  17. S Kent (1980). Protecting Externally Supplied Software in Small Computers.
  18. James Gosler (1985). Software Protection: Myth or Reality?.
  19. Markus Jakobsson,Michael Reiter (2002). Discouraging Software Piracy Using Software Aging.
  20. A Herzberg,S Pinter (1987). Public Protection of Software.
  21. Frederick Cohen (1993). Operating system protection through program evolution.
  22. D Aucsmith,G Graunke (1996). Tamper Resistant Methods and Apparatus.
  23. C Collberg,C Thomborson,D Low (1998). Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs.
  24. C Collberg,C Thomborson,D Low (1998). Breaking abstractions and unstructuring data structures.
  25. C Collberg,C Thomborson,D Low (1997). A Taxonomy of Obfuscating Transformations.
  26. B Horne,L Matheson,C Sheehan,R Tarjan (2002). Dynamic Self-Checking Techniques for Improved Tamper Resistance.
  27. Hoi Chang,Mikhail Atallah (2002). Protecting Software Code by Guards.
  28. Y Chen,R Venkatesan,M Cary,R Pang,S Sinha,M Jakubowski (2002). Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.
  29. P Gutmann An Open-source Cryptographic Coprocessor.
  30. E Eilam (2005). Reversing: Secrets of Reverse Engineering.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

N.Sasirekha. 1970. \u201cA Survey on Software Protection Techniques against Various Attacks\u201d. Unknown Journal GJCST Volume 12 (GJCST Volume 12 Issue 1): .

Download Citation

Journal Specifications
Version of record

v1.2

Issue date

January 15, 2012

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 20600
Total Downloads: 10932
2026 Trends
Related Research

Published Article

Software security and protection plays an important role in software engineering. Considerable attempts have been made to enhance the security of the computer systems because of various available software piracy and virus attacks. Preventing attacks of software will have a huge influence on economic development. Thus, it is very vital to develop approaches that protect software from threats. There are various threats such as piracy, reverse engineering, tampering etc., exploits critical and poorly protected software. Thus, thorough threat analysis and new software protection schemes, needed to protect software from analysis and tampering attacks becomes very necessary. Various techniques are available in the literature for software protection from various attacks. This paper analyses the various techniques available in the literature for software protection. The functionalities and the characteristic features are various software protection techniques have been analyzed in this paper. The main goal of this paper is to analyze the existing software protection techniques and develop an efficient approach which would overcome the drawbacks of the existing techniques.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

A Survey on Software Protection Techniques against Various Attacks

N.Sasirekha
N.Sasirekha Bharathiar University
Dr.M.Hemalatha
Dr.M.Hemalatha

Research Journals