Title :
The use of honeypot approach in software-based application protection for shareware programs
Author :
Jap, C. H Nick ; Blanchfield, P. ; Su, K. S Daniel
Author_Institution :
Univ. of Nottingham, Semenyih, Malaysia
Abstract :
Shareware programs are susceptible to piracy. Various reverse engineering methods used to circumvent software-based protection employed by existing shareware programs were analysed in this paper to provide insight into their weaknesses. These weaknesses include easily reverse-engineered algorithms, algorithms that compare the valid key with the entered key in plain text in memory, algorithms that reveal the actual key in memory and single point of failure. Because shareware programs are generally inexpensive and are developed by small teams, it may not be practical for shareware developers to implement protection solutions that are prohibitive in terms of cost and effort. A honeypot approach that can be implemented without significant effort, aimed at prolonging the time taken to fully circumvent the protection is proposed and tested. It has the following properties - appears to be easily defeated, is unpredictable and stealthy, and is a machine-dependent algorithm.
Keywords :
data privacy; public domain software; reverse engineering; software engineering; watermarking; actual key; honeypot approach; machine-dependent algorithm; plain text; program bug; reverse engineering method; shareware program; software piracy; software watermarking; software-based protection technique; valid key; Application software; Computer bugs; Costs; Embedded software; Programming profession; Protection; Reverse engineering; Software algorithms; Testing; Watermarking;
Conference_Titel :
Computing & Informatics, 2006. ICOCI '06. International Conference on
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-4244-0219-9
Electronic_ISBN :
978-1-4244-0220-5
DOI :
10.1109/ICOCI.2006.5276444