Publication: Intelligent guard: a novel approach toward software protection
dc.contributor.coauthor | Salehpour, Arash | |
dc.contributor.coauthor | Mokhtari Nazarlu, Morteza | |
dc.contributor.department | Graduate School of Sciences and Engineering | |
dc.contributor.kuauthor | Etemad, Mohammad | |
dc.contributor.schoolcollegeinstitute | GRADUATE SCHOOL OF SCIENCES AND ENGINEERING | |
dc.date.accessioned | 2024-11-09T23:38:57Z | |
dc.date.issued | 2011 | |
dc.description.abstract | Developing a software product is an extremely big deal, and can be a huge investment of cost and time. So, software piracy protection is a main concern of software-development companies. This paper presents an intelligent protection system, through using an intelligent guard delivered with the software . The guard itself is protected by a one-time-use key that resides on a USB device, and observes the environment to see whether there are suspicious operations like debugging. To get information about suspicious operations, it relies on the OS. Upon finding one or more such operations, the guard will send a signal to the software, which makes it to call disposer functions. To prevent the possibility of code reverse engineering, the program in IL, is saved encrypted, and is decrypted prior to every execution. All these operations are managed by the guard. To install and execute the software, the guard must be installed, in advance. © 2011 Springer-Verlag. | |
dc.description.indexedby | WOS | |
dc.description.indexedby | Scopus | |
dc.description.issue | PART 4 | |
dc.description.openaccess | YES | |
dc.description.publisherscope | International | |
dc.description.sponsoredbyTubitakEu | N/A | |
dc.description.sponsorship | Springer | |
dc.description.volume | 254 CCIS | |
dc.identifier.doi | 10.1007/978-3-642-25483-3_37 | |
dc.identifier.isbn | 9783-6422-5482-6 | |
dc.identifier.issn | 1865-0929 | |
dc.identifier.quartile | N/A | |
dc.identifier.scopus | 2-s2.0-82955223377 | |
dc.identifier.uri | https://doi.org/10.1007/978-3-642-25483-3_37 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14288/13033 | |
dc.identifier.wos | 310937500037 | |
dc.keywords | Protection systems | |
dc.keywords | Software piracy protection | |
dc.keywords | Software products | |
dc.keywords | software protection | |
dc.keywords | USB devices | |
dc.keywords | Computer crime | |
dc.keywords | Crime | |
dc.keywords | Expert systems | |
dc.keywords | Information science | |
dc.keywords | Reverse engineering | |
dc.keywords | Software design | |
dc.keywords | Software engineering | |
dc.keywords | Security of data | |
dc.language.iso | eng | |
dc.publisher | Springer Nature | |
dc.relation.ispartof | Communications in Computer and Information Science | |
dc.subject | Software | |
dc.subject | Engineering | |
dc.subject | Computer engineering | |
dc.title | Intelligent guard: a novel approach toward software protection | |
dc.type | Conference Proceeding | |
dspace.entity.type | Publication | |
local.contributor.kuauthor | Etemad, Mohammad | |
local.publication.orgunit1 | GRADUATE SCHOOL OF SCIENCES AND ENGINEERING | |
local.publication.orgunit2 | Graduate School of Sciences and Engineering | |
relation.isOrgUnitOfPublication | 3fc31c89-e803-4eb1-af6b-6258bc42c3d8 | |
relation.isOrgUnitOfPublication.latestForDiscovery | 3fc31c89-e803-4eb1-af6b-6258bc42c3d8 | |
relation.isParentOrgUnitOfPublication | 434c9663-2b11-4e66-9399-c863e2ebae43 | |
relation.isParentOrgUnitOfPublication.latestForDiscovery | 434c9663-2b11-4e66-9399-c863e2ebae43 |