A Thorough Investigation on Software Protection Techniques against Various Attacks
Journal Title: Bonfring International Journal of Software Engineering and Soft Computing - Year 2012, Vol 2, Issue 3
Abstract
Software security and protection plays an important role in software engineering. Considerable attempts have been made to enhance the security of the computer systems because of various available software piracy and virus attacks. Preventing attacks of software will have a huge influence on economic development. Thus, it is very vital to develop approaches that protect software from threats. There are various threats such as piracy, reverse engineering, tampering etc., exploits critical and poorly protected software. Thus, thorough threat analysis and new software protection schemes, needed to protect software from analysis and tampering attacks becomes very necessary. Various techniques are available in the literature for software protection from various attacks. This paper analyses the various techniques available in the literature for software protection. The functionalities and the characteristic features are various software protection techniques have been analyzed in this paper. The main goal of this paper is to analyze the existing software protection techniques and provide directions to overcome the drawbacks of the existing techniques.
Authors and Affiliations
Sasirekha N, Dr. M. Hemalatha
Optimization of Milling Operation Using Genetic and PSO Algorithm
Metal cutting is one of the important and widely used manufacturing processes in engineering industries. Optimizing the machining parameters has become an essential one in order to be competitive and to meet customer dem...
3D Adventure Game Using Unity
3D game with a First Person Shooting as well as Third Person Shooting mode available in which the player has to search the enemies on an amazing terrain map and kill the enemies using own wit and action.Project mainly de...
Synergy of Classical and Model-Based Object-Oriented (OO) Metrics in Reducing Test Costs
Software testing and maintenance being interleaved phases span more in software life cycle. The efforts to minimize this span rely obviously on testing when maintenance is natural. The features of Object-Oriented (OO) so...
Block Chain Technology for Privacy Protection for Cloudlet-based Medical Data Sharing
With the popularity of wearable devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing block chain of medical data mainly incl...
An Improved Compiler Directed Power Optimization for Disk Based Systems using Back Propagation Neural Networks
The performance of the parallel disk systems is highly affected by excessive power consumption. Hence, various researches are being done in the areas of energy optimization of such systems. Because of the extensive growt...