Assessment of Dongle-based Software Copy Protection Combined with Additional Protection Methods

نویسندگان

  • A. Liutkevicius
  • A. Vrubliauskas
  • E. Kazanavicius
چکیده

There are a lot of methods to fight against software illegal use, which can be divided into two major groups: software-based protection and hardware-based protection. One of the popular hardware-based software copy protection methods is based on special hardware called “dongle”. Dongle is a small USB, RS232 or LPT interface device usually, like USB flash pen, which protects applications from being illegally replicated from original copy. An application is not functional or looses major functionality without dongle plugged in host PC. Application is bound with particular dongle while dongle itself is almost impossible to clone or hack, hence illegally copied application is worthless. Many people and even some software developers and vendors think, that dongle based protection is very hard to break. But such method has its weak spot – communication between dongle and application logic. Communication security can be improved by using standard well known methods [1], [2] like AES, DES, 3DES, RC2, Rijndael, etc., however it only protects low level data transfer between dongle and application, and the attack can be performed at a higher level. Usually application protection is implemented by identifying dongle and checking some secret value, kept in dongle memory. But the problem is that modern software, independently from the programming languages and technologies, can be reverse engineered, disassembled or debugged. Attacker just needs to find code fragments, where applications asks dongle for some value, and place jump over those fragments, so hacked application completely ignores presence of dongle. We found some dongle vendors, which recommend having many calls to dongle, make them randomly and so on, but this adds just few additional minutes for attacker to spend without making protection really stronger. Recently more advanced dongles appeared, like Rockey (rockey.com.my), Keylok (keylok.com) and some other, which are able to hide some application part inside of them, and execute that part directly in the dongle. This is quite new and promising technology we believe is very hard to break, but it requires more research regarding security strength measurements. On the other hand there are a lot of conventional dongle vendors and users, so our investigation and experiments were intended to show, if it was possible to implement good copy protection using dongles without code execution in combination with other well known software protection techniques, like software packers, anti-debugging, code obfuscation and so on.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Distributed Architecture for Remote Validation of Software Licenses Using USB/IP Protocol

USB dongles have been used by a wide range of software manufacturers to store a copy-protected of their application’s license. The licenses validation procedure through USB dongles faces several concerns, as the risks of theft or losing dongle. Also, in scenarios where the number of dongles is reduced, users may have to wait for dongle access, which may lead to loss of productivity. In this pap...

متن کامل

ارائه یک روش نرم افزاری جهت استفاده از ارزیابی ریسک در بهینه سازی اقدامات حفاظت حریق ساختمان

  Background and aims: The property loss and physical injuries due to fire events in buildings demonstrate the necessity of implementation of efficient and performance based fire safety measures. Effective and high efficiency protection is possible when design and selection of protection measures are based on risk assessment. This study aims at presenting a software method to make possible sele...

متن کامل

Software Protection by Hardware and Obfuscation

In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote server on the same network. We show that such a protection method can be combined with the code obfuscation method and develop two obfuscation methods for the proposed software protection architecture.

متن کامل

The Impact of Technical Copy Protection and Internet Services Usage on Software Piracy - An International Survey on Sequencer Software Piracy -

Software piracy has recently gained enormous attention, not only in the context of P2P-networks. As one countermeasure against software piracy, publishers have been implementing Digital Rights Management systems such as technical copy protection measures into their software products. This paper examines the impact of different technical copy protection measures and Internet services usage on so...

متن کامل

A Cache Design for a Security Architecture for Microprocessors (SAM)

Protecting software and data becomes more and more important, especially, when sensitive or expensive software is executed on remote hosts. This protection includes copy protection, prevention of disassembling, prevention of altering the program flow and protection of processed data. For personal computers protection is more focused on copy protection. However, providing extended security to pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011