New Online Modules Model of Software Copy Protection in Serial-Based Method

International Journal of Computer & Organization Trends (IJCOT)          
© 2013 by IJCOT Journal
Volume-3 Issue-4                           
Year of Publication : 2013
Authors :  Bhawana Parihar , Neha Bora


Bhawana Parihar , Neha Bora . "New Online Modules Model of Software Copy Protection in Serial-Based Method" . International Journal of Computer & organization Trends (IJCOT), V3(4):47-54 Jul - Aug 2013, ISSN 2249-2593, Published by Seventh Sense Research Group.


One of the most significant concerns of software corporations is protect their products against unauthorized copying. Since now the researchers proposed some copy protection models that all of them have weakness to protect against unauthorized copying. The goal of this paper is propose novel model of serial-based method that more security against illegal usage and offered Online Modules model, in serial-based method that it spilt the software to two parts as well. Fist part run in client and second part run in web service, when the software needs to use the second part then the software connect to the web service and the server check the software license. If the license has been valid then run the second part. This model compares with online activation model in serial-based method and we will show the proposed model has more secure against unauthorized copying.


[1] Cerven, P., 2002. Crackproof Your Software. In: San Francisco: William Pollock, pp. 3-6.
[2] Djekic, P. & Loebbecke, C., 2007. Preventing application software piracy: An empirical investigation of technical copy protections. Journal of Strategic Information Systems 16, 12 july, p. 173–186.
[3] Ankit, J., Kuo, J., Jordan Soet, J. & Tse, B., 2007. Software Cracking.
[4] Merckx, G., 2006. Software Security thirough Targetted Diversification, s.l.: Katholieke University IT Leuven.
[5] Usama, M. & Sobh, M., 2011. Software Copy Protection and Licensing based. IEEE, pp. 856-861.
[6] Joye, M., 2008. On White-Box Cryptography. Security of Information and Networks,, pp. 7-12.
[7] Tanenbaum, A. S., 2002. Computer Networks. In: 4th ed. s.l.:Prentice Hall, pp. 156-165.
[8] Nützel, J. . & Beyer, A., 2006. Towards Trust in Digital Rights Management Systems. ACM workshop on Digital rights.
[9] Nigurrath, S., 2005. Cracking with loaders: theory, general approach and a framework. ARTeam.
[10] Eberhardt, G. & Nagy, Z., 2006. Copy protection through software watermarking and obfuscation. Department of Measurement and Information Systems Budapest University of Technology and Economics Budapes.
[11] Razeen, M., Ali, A. & Sheikh, N. M., 2003. Software protection: The Last Line of Defense against Piracy.
[12] Bobba, J. et al., 2009. StealthTest: Low Overhead Online Software Testing using Transactional Memory. Appears in the Conf on Parallel Architectures and Compilation Techniques (PACT), september.
[13] Linn, C. & Debray, S., 2003. Obfuscation of Executable Code to ImprovenResistance to Static Disassembly. Department of Computer Science University of Arizona.
[14] Ionescu, A., 2004. Introduction to NT Internals, Part 1: Processes, Threads, Fibers and Jobs, Relsoft Technologies.
[15] Li, S., 2004. A Survey on Tools for Binary Code Analysis. Stony Brook University, pp. 37-52.
[16] Genov, E., 2008. Designing Robust Copy Protection for Software Products. International Conference on Computer Systems and Technologies.
[17] Madou, M., Anckaert, B., Sutter, B. D. & Bosschere, K. D., 2004. Hybrid Static-Dynamic Attacks against Software Protection Mechanisms. Ghent University.
[18] Vishal Gupta, Neha Bora, Nitin Arora; “Equivalence between the Number of Binary Trees, Stack Permutations and Chain Matrix Multiplication” International Journal of Advances in Engineering, Science and Technology, pp. 232-235, Vol. 2- No. 3, Aug-Oct 2012.
[19] J. Ziv and A. Lempel, "An universal algorithm for sequential Data compression", in IEEE Transactions on Information Theory, 1977, Vol. 23, Issue 3, pp. 337-343.
[20] Vishal Gupta; “Comparative Performance Analysis of AODV, DSR, DSDV, LAR1 and WRP Routing Protocols in MANET Using GloMoSim 2.0.3 Simulator” International Journal of Computer Applications (0975-8887), pp. 16-24, Vol. 52- No. 20, August 2012.
[21] Vishal Gupta, Neha Bora, Deepika Sharma; “A Survey of Dynamic Instruction Scheduling for Microprocessors Having Out Of Order Execution” International Journal of Computer Application, pp. 80-88, Issue 2 Vol. 5, October 2012.
[22] Suresh Kumar, Vishal Gupta and Vivek Kumar Tamta; “Dynamic Instruction Scheduling for Microprocessors Having Out Of Order Execution” Computer Engineering and Intelligent Systems, IISTE, pp. 10–14, Vol. 3- No. 4, 2012.
[23] Stallman, R., 2003. Stallman and the GCC Developer Community. Using the GNU Compiler Collection, GNU Press.
[24] Sutter, D., Bus, D., Bosschere, D. & Demoen, K., 2000. On the Static Analysis of Indirect Control Transfers in Binaries. Ghent University and Katholieke Universiteit Leuven.
[25] Schneier, B., 1996. Applied Cryptography. In: s.l.:John Wiley & Sons, pp. 39-44.
[26] Shi, W., Lu, C. & Zhang, T., 2004. Attacks and Risk Analysis for Hardware Supported Software Copy Protection Systems. College of Computingy School of Electrical and Computer Engineeringz Georgia Institute of Technology Atlanta.
[27] Zhao, J. & Yao, N., 2009. A New Method to Protect Software from Cracking. World Congress on Computer Science and Information Engineering.


Online Modules Model, Serial-Based Method, Software Protection, Unauthorized Copying.