Abstract
To protect software piracy, software manufacturers use protective technologies such as license authentication. Despite this, attackers use software illegally by neutralizing the license authentication techniques by reverse engineering. We analyze the vulnerabilities of the software D’s license authentication techniques to find the underlying problems inherent in its existing protection techniques. The analysis reveals the code for license authentication in software D and can bypass license authentication by modifying the authentication result value or code flow. Moreover, this software provides license types such as single-user, family, educational, and corporate, and we demonstrated that all types of licenses were neutralized. In conclusion, addressing the fundamental vulnerabilities of the software D’s license authentication technology can improve the security of its license authentication technology, which is considered more robust in protecting the intellectual property rights of software.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Jung, W., Lee, K.: Vulnerability analysis of intellectual property rights using reverse engineering: based on B software (2020)
Lee, J., Lee, K.: Vulnerability analysis of software piracy and reverse engineering: based on A software (2020)
Chandu V.P., Singh K., Baskaran R.: A Model for prevention of software piracy through secure distribution. In: Sobh, T. (eds.) Advances in Computer and Information Sciences and Engineering, pp. 251–255. Springer, Dordrecht (2008) https://doi.org/10.1007/978-1-4020-8741-7_45
Veeranna, N., Schafer, B.C.: Efficient behavioral intellectual properties source code obfuscation for high-level synthesis. In: 2017 18th IEEE Latin American Test Symposium (LATS), pp. 1–6 (2017)
Lee, S.-R.: A Design of illegal usage protection system of software through internet. J. Korea Soc. Comput. Inf. 6(4), 110–118 (2001)
Myles, G.M.: Software Theft Detection Through Program Identification, Ph.D thesis, Department of Computer Science, The University of Arizona (2006)
Acknowledgments
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2021R1A4A2001810).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Jung, W., Yim, K., Lee, K. (2022). Vulnerability Analysis of Intellectual Property Rights Using Reverse Engineering: Based on Software D. In: Barolli, L., Yim, K., Chen, HC. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2021. Lecture Notes in Networks and Systems, vol 279. Springer, Cham. https://doi.org/10.1007/978-3-030-79728-7_50
Download citation
DOI: https://doi.org/10.1007/978-3-030-79728-7_50
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-79727-0
Online ISBN: 978-3-030-79728-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)