CURBING SOFTWARE PIRACY IN DEVELOPMENT ENVIRONMENT USING CODE SPLITTING, OBFUSCATION AND FINGERPRINTING TECHNIQUES

  • Ms Word Format
  • 67 Pages
  • ₦3,000 | $25 | ₵60 | Ksh 2720
  • 1-5 Chapters

CURBING SOFTWARE PIRACY IN DEVELOPMENT ENVIRONMENT USING CODE SPLITTING, OBFUSCATION AND FINGERPRINTING TECHNIQUES

Abstract:

Software Piracy has become a major problem for businesses and its widespread in many parts of the world leads to financial losses and harm to consumers. These problems caused the deployment of many security techniques to control piracy. A lot of researches have been done on software security techniques but unfortunately protecting software source code in development environment has been a challenge for software companies as software source codes are not yet transformed to unreadable codes. Therefore, software piracy emanating from development environments, mostly by insiders, has been a big problem to tackle because the prevalent software protection techniques were primarily developed for use at production stage. Based on the literature review, no research was found on piracy reduction in development environment. In this research work an architecture has been proposed and implemented based on design obfuscation that enables tracking pirated standalone software at development stage using the hardware and software aspects, online or offline, and tracing vulnerable PCs within a company. Code Splitting, obfuscation and fingerprinting techniques were used to design the proposed architecture. Two examination results processing software: ExamsLOGIC 2.0 and ELogicPLUS were used to test the proposed architecture for existing and new applications respectively. The result was compared with the result of the reviewed work and found to be improved. For both the two applications, it was found that the proposed architecture is feasible and effective.

CURBING SOFTWARE PIRACY IN DEVELOPMENT ENVIRONMENT USING CODE SPLITTING, OBFUSCATION AND FINGERPRINTING TECHNIQUES

0 Shares:
Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like