By Topic

A New Method to Protect Software from Cracking

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Jianming Zhao ; Fujian Normal Univ., Fuzhou, China ; Nianmin Yao ; Shaobin Cai

There have been many methods to protect the commercial software from being cracked. But the crackers can always skip the protecting part through analyzing the assembly code of the software. A new protecting method is presented here. It breaks the original software into two parts. A part which is so important that it canpsilat be skipped, called key process of computing, is put at the remote server side and the rest runs on the local machine as usual. When the software runs into the departed part, it must call the remote part through RPC to get the right answer and goes on. We can see, in this method, the cracker canpsilat get the execution code of the remote part and he also canpsilat just skip the remote part. So the only way to crack the software protected by this method is to reimplement the key process of computing. If the key process of computing we select is complicated enough, to do it will be such a great work not less than reimplementing the whole software. This method is also easy to be deployed. The commercial software can be distributed by the internet and that is the cheapest way so far. The only shortcoming of it is that when the software is running, the machine must be connected onto the internet. That may not be a big problem when the internet can be connected to everywhere now.

Published in:

Computer Science and Information Engineering, 2009 WRI World Congress on  (Volume:2 )

Date of Conference:

March 31 2009-April 2 2009