Fingerprinting Techniques And Good Program Security Techniques

Computers & TechnologyTechnology

  • Author Jose Sogiros
  • Published April 27, 2010
  • Word count 859

In the software industry, software copyright infringement is a special reason of headache. However, there are possibilities! Particular forms of watermarking are usable and can be used to chase down the origin of the illicit supplier. The standard software watermarking can be practiced as validation of authorship. Apparently, the purpose is to discourage piracy. Let's further on check out if the doubt continues whether the method is competent.

Anti reversing measurements for software lie in furnishing strong methods for software distribution. Naturally, in the mean time, these also protect the rights of the software provider. This is undertaken by methods for registration management merged with online license distribution management. All this comprises

  • supplying downloads of the software
  • controlling the delivery of licenses
  • supplying individual licenses for a software
  • verifying the functioning of each product with the individual license conditions.

Apparently, this is a quite challenging matter. Still, fresh investigating has found kind of solid resolves to the problem. Fresh methods personalise each copy. It makes the licensing mechanism resistant to assaults with patches. Patches circumvent licensing systems in software. Patches are also only little hacking programs, however they make a "nice" job! Their success or failure is based on the condition that the bytes of the licensing code in the software must be equal between copies, so that one common patch can incapacitate the licensing scheme in every last copy of that certain version of the software. This means that evading the protection in one copy by successfully dispatching the check code of the license will not function on the following copy. Such a general patch will fail to evade the following licensing check because every last copy was changed on an individual basis.

Apropos, it is less problematic for pirates if there is no verification code, so, always pick out schemes that include confirmation code to guard the watermarks themselves! If check code declines to execute the software when something is defective, then cracking becomes a totally different issue.

Programmers watermark a software by implanting unique identifiers. It asserts property rights to the legitimate owner. But, this processing can also serve to chase down the pirate after the illegitimate deed. Indeed, software watermarking itself does not forestall copyright infringement but scares the reverser from infringement of copyright by raising the possibility of getting captivated. Watermarking is not a simple method. It must be remarked it is sooner the contrary. Most other existent anti reversing methods are easy to apply though their potency in forestalling reversing is oft problematic. Nowadays, many programs are distributed in formats which are uncomplicated to hack. Microsoft Intermediate Language and Java Bytecode are such formats. These formats make that the attacker can easily decompile or examine the source code under disassembler and/or debugger. Next, it becomes nearly too simple to locate and get rid of all remains of the method. And this even includes the example of watermarking.

Software watermarking and fingerprinting are systems that have recently been analysed - in academic surroundings - to prohibit illegal reversing. The available methods are analogous to those of media watermarking where a unique identifier is included in data such as text, images, audio, or video. As a matter of fact, these techniques create minor errors in the media that are undetectable by the human sensory systems. Program data is much more sensitive to modifications. This makes a fundamental divergence for programs and the watermark can't be implanted just anyplace. Instead,embedding the unique identifier in software must not break the original functioning in whatever manner, exactly because unreliable handling might produce the software to crash.

So, software watermarking implements a unique identifier - called the watermark - into a program. If the identifier uniquely returns the author of the program, then the identifier is a copyright notice. However, if the identifier uniquely distinguishes the legitimate purchaser of the program, then the watermark is a fingerprint. An important facet of watermarking is the employment of a private key. Through the utilisation of the key, the watermark is combined into the software, producing a - though slightly - otherwise software. Nevertheless, the problem persists: a watermark can testify property but it can not guide to the actual perpetrator of the illegitimate action. It necessitates a fingerprint to bring such characteristics to the watermark. In fact, the fingerprint is a watermark carrying information from the individual customer.

There are two general categories of watermarking algorithms, static and dynamic. To apply and/or extract the watermark, the dynamic algorithm relies on information collected during executing of the software. Static algorithms only analyse the code and information of the software on disk. There are few reports drawing the evaluation of these algorithms. A variety of software watermarking methods have been inquired though. Remark there are less dynamic watermarking algorithms than static because it is simpler to obliterate in binary source code on disk than at runtime.

Software watermarking provides sound anti cracking characteristics. Yet, implementation techniques, algorithms and the necessary resources for individualisation form a block to their general usage. Perhaps this will alter in the future but that is also why existent methods of watermarking are mostly set aside for pricey software.

In addition to authorship, 64 bit protection is writer Sogiros' principal domain of involvement. See more such powerful information about anti hacking protection applications.

Article source: https://articlebiz.com
This article has been viewed 1,140 times.

Rate article

Article comments

There are no posted comments.

Related articles