DocumentCode :
3388894
Title :
A key hiding based software encryption protection scheme
Author :
Hu, Jain Jun ; Wen, Qiaoyan ; Tang, Wen ; Sui, Ai-Fen
Author_Institution :
State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China
fYear :
2011
fDate :
25-28 Sept. 2011
Firstpage :
719
Lastpage :
722
Abstract :
Today software has already become the critical e-assets integrated with valuable intellectual property, such as functions, processes or secrets, etc. The problem is that software, especially written in intermediate languages (Java, .NET, etc) are easy to be decompiled for reverse engineering, so the proprietary business logic, core algorithm implementation, software licensing code, and copy protection mechanisms of software are more susceptible to malicious reuse. Anyone with special decompile or reverse engineering tools such as .NET Reflect, JAD can exploit the vulnerabilities, steal unique ideas, bypass license checks, etc. In this paper we describe a key hiding based software encryption method to protect the intellectual and copy rights for software.
Keywords :
cryptography; industrial property; reverse engineering; .NET Reflect; copy protection mechanisms; e-assets; intellectual property; key hiding; reverse engineering; software copy rights; software encryption protection; software licensing code; Key-hiding; Software protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Technology (ICCT), 2011 IEEE 13th International Conference on
Conference_Location :
Jinan
Print_ISBN :
978-1-61284-306-3
Type :
conf
DOI :
10.1109/ICCT.2011.6157970
Filename :
6157970
Link To Document :
بازگشت