Font Size: a A A

The Research And Design Of The Software Protection Program Which Is Based On Machine Code

Posted on:2012-09-11Degree:MasterType:Thesis
Country:ChinaCandidate:J R LinFull Text:PDF
GTID:2218330362457500Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Intellectual property protection and the prevention of software piracy is not a new topic. Every successful software vendors are targeting the major piracy. Because computer software is intellectual product, so can easily be copied, the software piracy to the global computer business has brought huge economic losses. At present, the software protection methods are technically and legally related to the protection of the software made. In 1991 the State Council issued the "Computer Software Protection Regulations of the PRC. " However, only legally be regulated, and violations can not contain the software. The most direct and effective way is to apply technology to the protection of software products, currently there are a variety of software protection technology, such as the serial number protection, time limit, KeyFile protection, software and dogs. These methods have advantages and disadvantages, a simple encryption method is very easy to be pirates will crack. Software cracking tools There are many, such as dynamic analysis tools, static analysis tools, search tools, shell and back shell.The main topic of how to use native code to achieve the extraction of computer software protection purposes. Extraction of hard drive serial number used as a way to generate machine code.Project will study how this method application in the enterprise, through the development of an effective mechanism to make the software license key generated to maintain the confidentiality of producers, users can not be inferred under the registration code software encryption. By comparing the information on this topic using a variety of hardware to read the hard disk serial number of ways to generate machine code. By RI(Encoder) and decryption machine (Decoder) software used in conjunction to achieve the purpose of protection. Decryption key for this program was written in the executable file itself. This technical difficulty is how to extract the hard drive serial number and how to achieve the Mechanism of RI and decryption. Method of extracting the hard disk serial number is more complex, you need to determine the type of operating system for different types of operating systems using different communications methods and device drivers, and to read and write operations. DeviceIoControl API function interface function using the specified device driver to send the right control codes and data, and analysis of its response, the ultimate representative of the machine to extract the hard disk serial number. RI and decryption machine used by a complex set of algorithms, software product executable by rewriting the bottom, the software decryption key to achieve the purposes of registration.The results of this paper through a machine to address how to approach a yard to prevent the spread of software piracy problem has certain significance.
Keywords/Search Tags:Software Protection, Machine Code, Decryption Key
PDF Full Text Request
Related items