A Survey on Software Protection Techniques against Various Attacks

Article ID

VLR82

A Survey on Software Protection Techniques against Various Attacks

N.Sasirekha
N.Sasirekha Vidyasagar College of Arts and Science
Dr.M.Hemalatha
Dr.M.Hemalatha
DOI

Abstract

Software security and protection plays an important role in software engineering. Considerable attempts have been made to enhance the security of the computer systems because of various available software piracy and virus attacks. Preventing attacks of software will have a huge influence on economic development. Thus, it is very vital to develop approaches that protect software from threats. There are various threats such as piracy, reverse engineering, tampering etc., exploits critical and poorly protected software. Thus, thorough threat analysis and new software protection schemes, needed to protect software from analysis and tampering attacks becomes very necessary. Various techniques are available in the literature for software protection from various attacks. This paper analyses the various techniques available in the literature for software protection. The functionalities and the characteristic features are various software protection techniques have been analyzed in this paper. The main goal of this paper is to analyze the existing software protection techniques and develop an efficient approach which would overcome the drawbacks of the existing techniques.

A Survey on Software Protection Techniques against Various Attacks

Software security and protection plays an important role in software engineering. Considerable attempts have been made to enhance the security of the computer systems because of various available software piracy and virus attacks. Preventing attacks of software will have a huge influence on economic development. Thus, it is very vital to develop approaches that protect software from threats. There are various threats such as piracy, reverse engineering, tampering etc., exploits critical and poorly protected software. Thus, thorough threat analysis and new software protection schemes, needed to protect software from analysis and tampering attacks becomes very necessary. Various techniques are available in the literature for software protection from various attacks. This paper analyses the various techniques available in the literature for software protection. The functionalities and the characteristic features are various software protection techniques have been analyzed in this paper. The main goal of this paper is to analyze the existing software protection techniques and develop an efficient approach which would overcome the drawbacks of the existing techniques.

N.Sasirekha
N.Sasirekha Vidyasagar College of Arts and Science
Dr.M.Hemalatha
Dr.M.Hemalatha

No Figures found in article.

N.Sasirekha. 1970. “. Unknown Journal GJCST Volume 12 (GJCST Volume 12 Issue 1): .

Download Citation

Journal Specifications
Classification
Not Found
Article Matrices
Total Views: 20541
Total Downloads: 10958
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

A Survey on Software Protection Techniques against Various Attacks

N.Sasirekha
N.Sasirekha Vidyasagar College of Arts and Science
Dr.M.Hemalatha
Dr.M.Hemalatha

Research Journals