By Topic

A key hiding based software encryption protection scheme

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Jian Jun Hu ; State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China ; Qiaoyan Wen ; Wen Tang ; Ai-Fen Sui

Today software has already become the critical e-assets integrated with valuable intellectual property, such as functions, processes or secrets, etc. The problem is that software, especially written in intermediate languages (Java, .NET, etc) are easy to be decompiled for reverse engineering, so the proprietary business logic, core algorithm implementation, software licensing code, and copy protection mechanisms of software are more susceptible to malicious reuse. Anyone with special decompile or reverse engineering tools such as .NET Reflect, JAD can exploit the vulnerabilities, steal unique ideas, bypass license checks, etc. In this paper we describe a key hiding based software encryption method to protect the intellectual and copy rights for software.

Published in:

Communication Technology (ICCT), 2011 IEEE 13th International Conference on

Date of Conference:

25-28 Sept. 2011