Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 8.14 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
In the contemporary era characterized by pervasive internet usage, the escalation of software piracy poses a substantial challenge, exacerbated by advancements in computer technologies. In response to these malicious incursions, the integration of code obfuscation techniques presents a viable strategy by transforming programs into resistant patterns. This research introduces a novel obfuscation methodology that amalgamates nontrivial code replicas with established obfuscation practices, tailored to meet specific efficacy requirements. The justification for this approach stems from the imperative need to address prevalent security risks. The proposed methodology is elucidated, accompanied by an illustrative example. Furthermore, the study advocates for a software piracy prevention mechanism, wherein established cryptographic techniques including Triple DES, Zero-knowledge proof, and enhanced RSA are employed to fortify the system. The devised system incorporates a projected technique for safeguarding software documentation and records, coupled with a proposed methodology for generating a unique software Copy Identification Number (ICN). Through the analysis of opcode sequences derived from these altered replicas, a proficient model is employed to identify suspicious software and ascertain its resemblance to the original program. A higher score indicates a high likelihood that the suspicious program represents a modified version of the underlying software. Additionally, dynamic code mutation is introduced as a countermeasure to complicate reverse engineering efforts. Conversely, a lower score suggests substantial dissimilarity between the suspicious software and the grounded software. This research demonstrates the resilience of the proposed technique, emphasizing that significant modifications to the underlying program are necessary before its identification becomes feasible.
"Software Piracy Protection and Detection using HMM, Code Obfuscation, Dynamic Code Mutation, and cryptographic techniques", International Journal of Science & Engineering Development Research (www.ijrti.org), ISSN:2455-2631, Vol.8, Issue 12, page no.458 - 468, December-2023, Available :http://www.ijrti.org/papers/IJRTI2312066.pdf
Downloads:
000205112
ISSN:
2456-3315 | IMPACT FACTOR: 8.14 Calculated By Google Scholar| ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 8.14 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator