B. Chatt, Rajesh Bhairampally, Amarsh Movva, A. Chopra
{"title":"一种防止软件盗版的伪随机I/O置乱与转换方法","authors":"B. Chatt, Rajesh Bhairampally, Amarsh Movva, A. Chopra","doi":"10.1109/TPSD.2006.5507459","DOIUrl":null,"url":null,"abstract":"This paper discusses a technique where input-output (I/O) is scrambled by mathematical manipulation. The process is effective in diverting the attention of adversary in terms of actual purpose of the application software. The technique is particularly useful when the software application performs certain number of mathematical equations, and produces a numerical result. The paper also demonstrates how the approach is effective in preventing reverse-engineering of the application. The paper illustrates the implementation of the scheme for a software application, and describes various software issues and practicality of implementation.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A pseudo random I/O scrambling and transformation approach in prevention of software piracy\",\"authors\":\"B. Chatt, Rajesh Bhairampally, Amarsh Movva, A. Chopra\",\"doi\":\"10.1109/TPSD.2006.5507459\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper discusses a technique where input-output (I/O) is scrambled by mathematical manipulation. The process is effective in diverting the attention of adversary in terms of actual purpose of the application software. The technique is particularly useful when the software application performs certain number of mathematical equations, and produces a numerical result. The paper also demonstrates how the approach is effective in preventing reverse-engineering of the application. The paper illustrates the implementation of the scheme for a software application, and describes various software issues and practicality of implementation.\",\"PeriodicalId\":385396,\"journal\":{\"name\":\"2006 IEEE Region 5 Conference\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 IEEE Region 5 Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TPSD.2006.5507459\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IEEE Region 5 Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TPSD.2006.5507459","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A pseudo random I/O scrambling and transformation approach in prevention of software piracy
This paper discusses a technique where input-output (I/O) is scrambled by mathematical manipulation. The process is effective in diverting the attention of adversary in terms of actual purpose of the application software. The technique is particularly useful when the software application performs certain number of mathematical equations, and produces a numerical result. The paper also demonstrates how the approach is effective in preventing reverse-engineering of the application. The paper illustrates the implementation of the scheme for a software application, and describes various software issues and practicality of implementation.