Software manipulative techniques of protection and detection

A review

M. A. Ibrahim, Zarina Shukur, Nasharuddin Zainal, Abdo A A Al-Wosabi

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Over the last decade, many studies have been conducted concerning the protection of software. Software piracy, tampering and stealing became the major concern of various parties such as software developers, suppliers, traders and consumers. This paper summarizes some of the related methods in software security such as steganography, obfuscation and cryptography. Also some of the most applicable techniques in securing software from manipulation such as software watermarking, fingerprinting and software birthmarking are reviewed in this paper.

Original languageEnglish
Pages (from-to)17953-17961
Number of pages9
JournalARPN Journal of Engineering and Applied Sciences
Volume10
Issue number23
Publication statusPublished - 2015

Fingerprint

Computer crime
Steganography
Watermarking
Cryptography

Keywords

  • Birthmark
  • Fingerprint
  • Obfuscation
  • Software protection
  • Software security
  • Software tampering
  • Steganography
  • Tamper detection
  • Watermark

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Software manipulative techniques of protection and detection : A review. / Ibrahim, M. A.; Shukur, Zarina; Zainal, Nasharuddin; Al-Wosabi, Abdo A A.

In: ARPN Journal of Engineering and Applied Sciences, Vol. 10, No. 23, 2015, p. 17953-17961.

Research output: Contribution to journalArticle

@article{85a499c068384161a9b208f01520c494,
title = "Software manipulative techniques of protection and detection: A review",
abstract = "Over the last decade, many studies have been conducted concerning the protection of software. Software piracy, tampering and stealing became the major concern of various parties such as software developers, suppliers, traders and consumers. This paper summarizes some of the related methods in software security such as steganography, obfuscation and cryptography. Also some of the most applicable techniques in securing software from manipulation such as software watermarking, fingerprinting and software birthmarking are reviewed in this paper.",
keywords = "Birthmark, Fingerprint, Obfuscation, Software protection, Software security, Software tampering, Steganography, Tamper detection, Watermark",
author = "Ibrahim, {M. A.} and Zarina Shukur and Nasharuddin Zainal and Al-Wosabi, {Abdo A A}",
year = "2015",
language = "English",
volume = "10",
pages = "17953--17961",
journal = "ARPN Journal of Engineering and Applied Sciences",
issn = "1819-6608",
publisher = "Asian Research Publishing Network (ARPN)",
number = "23",

}

TY - JOUR

T1 - Software manipulative techniques of protection and detection

T2 - A review

AU - Ibrahim, M. A.

AU - Shukur, Zarina

AU - Zainal, Nasharuddin

AU - Al-Wosabi, Abdo A A

PY - 2015

Y1 - 2015

N2 - Over the last decade, many studies have been conducted concerning the protection of software. Software piracy, tampering and stealing became the major concern of various parties such as software developers, suppliers, traders and consumers. This paper summarizes some of the related methods in software security such as steganography, obfuscation and cryptography. Also some of the most applicable techniques in securing software from manipulation such as software watermarking, fingerprinting and software birthmarking are reviewed in this paper.

AB - Over the last decade, many studies have been conducted concerning the protection of software. Software piracy, tampering and stealing became the major concern of various parties such as software developers, suppliers, traders and consumers. This paper summarizes some of the related methods in software security such as steganography, obfuscation and cryptography. Also some of the most applicable techniques in securing software from manipulation such as software watermarking, fingerprinting and software birthmarking are reviewed in this paper.

KW - Birthmark

KW - Fingerprint

KW - Obfuscation

KW - Software protection

KW - Software security

KW - Software tampering

KW - Steganography

KW - Tamper detection

KW - Watermark

UR - http://www.scopus.com/inward/record.url?scp=84953410901&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84953410901&partnerID=8YFLogxK

M3 - Article

VL - 10

SP - 17953

EP - 17961

JO - ARPN Journal of Engineering and Applied Sciences

JF - ARPN Journal of Engineering and Applied Sciences

SN - 1819-6608

IS - 23

ER -