Title :
A key hiding based software encryption protection scheme
Author :
Hu, Jain Jun ; Wen, Qiaoyan ; Tang, Wen ; Sui, Ai-Fen
Author_Institution :
State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China
Abstract :
Today software has already become the critical e-assets integrated with valuable intellectual property, such as functions, processes or secrets, etc. The problem is that software, especially written in intermediate languages (Java, .NET, etc) are easy to be decompiled for reverse engineering, so the proprietary business logic, core algorithm implementation, software licensing code, and copy protection mechanisms of software are more susceptible to malicious reuse. Anyone with special decompile or reverse engineering tools such as .NET Reflect, JAD can exploit the vulnerabilities, steal unique ideas, bypass license checks, etc. In this paper we describe a key hiding based software encryption method to protect the intellectual and copy rights for software.
Keywords :
cryptography; industrial property; reverse engineering; .NET Reflect; copy protection mechanisms; e-assets; intellectual property; key hiding; reverse engineering; software copy rights; software encryption protection; software licensing code; Key-hiding; Software protection;
Conference_Titel :
Communication Technology (ICCT), 2011 IEEE 13th International Conference on
Conference_Location :
Jinan
Print_ISBN :
978-1-61284-306-3
DOI :
10.1109/ICCT.2011.6157970