By Topic

The use of honeypot approach in software-based application protection for shareware programs

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Jap, C.H.N. ; Univ. of Nottingham, Semenyih, Malaysia ; Blanchfield, P. ; Su, K.S.D.

Shareware programs are susceptible to piracy. Various reverse engineering methods used to circumvent software-based protection employed by existing shareware programs were analysed in this paper to provide insight into their weaknesses. These weaknesses include easily reverse-engineered algorithms, algorithms that compare the valid key with the entered key in plain text in memory, algorithms that reveal the actual key in memory and single point of failure. Because shareware programs are generally inexpensive and are developed by small teams, it may not be practical for shareware developers to implement protection solutions that are prohibitive in terms of cost and effort. A honeypot approach that can be implemented without significant effort, aimed at prolonging the time taken to fully circumvent the protection is proposed and tested. It has the following properties - appears to be easily defeated, is unpredictable and stealthy, and is a machine-dependent algorithm.

Published in:

Computing & Informatics, 2006. ICOCI '06. International Conference on

Date of Conference:

6-8 June 2006