Abstract
Illegal use of software due to its piracy has been an issue for several years. Software piracy causes other issues such as non-retention of genuine software, violation of the license, and excessive use of the use period. These issues adversely affect the software market and industry. Several studies have been studied to analyze the weaknesses of the existing software copyright protection technologies, such as license authentication, obfuscation, and watermarking, for ameliorating these adverse impacts, revitalizing the software market and industry, and improving safety of software copyrights. However, the existing types of software protection technologies very are diverse, and they have different vulnerabilities even applied the same protection technology. We analyzed and demonstrated the vulnerability of the software protection technology of software C. Further, we proposed a more effective and overall security improvement method for software copyright protection technologies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Frame, J.D.: National commitment to intellectual property protection. J. Law Technol. 2, 209–227 (1987)
Lee, J., Lee, K.: Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on A Software (2020)
Jung, W., Lee, K.: Vulnerability Analysis of Intellectual Property Rights using Reverse Engineering: Based on B Software (2020)
Myles, G.M.: Software theft detection through program identification. Ph.D. thesis. Dept. of Computer Science, The Univ. of Arizona (2006)
Tamada, H., Nakamura, M., Monden, A., Matsumoto, K.: Java birthmarks – detecting the software theft. IEICE Trans. Inf. & Syst, E88-D(9), pp. 2148–2158 (2005)
Lee, S.R.: A design of illegal usage protection system of software through internet. J. Korea Soc. Comput. Informat. 6(4), 110–118 (2001)
Katz, J., Lindell, Y.: Introduction to Modern Cryptography , 3rd edn Chapman and Hall/CRC Press (2020)
Acknowledgments
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2021R1A4A2001810).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Lee, J., Yim, K., Lee, K. (2022). Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C. In: Barolli, L., Yim, K., Chen, HC. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2021. Lecture Notes in Networks and Systems, vol 279. Springer, Cham. https://doi.org/10.1007/978-3-030-79728-7_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-79728-7_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-79727-0
Online ISBN: 978-3-030-79728-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)