WHLK: Framework for Software Authentication and Protection
|
|
|
- Ella Martin
- 10 years ago
- Views:
Transcription
1 WHLK: Framework for Software Authentication and Protection Nishant Gupta 1, Shubhnandan S. Jamwal 2, Devanand Padha 3 1,2 Department of Computer Science & IT, University of Jammu 3 Department of Computer Science & IT, Central University of Jammu 1 {[email protected], } 2 {[email protected], }, 3 {[email protected], } ABSTRACT In the last decade, numbers of algorithms were developed to control the piracy. In most of the existing algorithms and software registration schemes, the identity of users and software is not taken into account. After identifying the fundamental weakness of existing piracy control measures, this paper proposes the implementation and testing of WHLK Model [1] in which we introduced an integration of Software Watermarking, Hardware Parameters and License Key that can greatly reduce unauthorized use of software. Unlike traditional static piracy prevention techniques, this new technique would embed the user identity in the software using dynamic watermarking algorithm. The hardware characteristics, which are extracted, and License Key of the software are integrated and then randomizing to generate a unique key dynamically during the software installation on the client machine. In this paper a novel approach is presented which secures the software from being pirated and makes it possible for genuine client to use the same. The proposed model is implemented and tested on 198 machines and the model works with an accuracy of 99.22%. Keywords: Software security, dynamic software watermarking, control measures of software piracy, harddisk loading, types of software piracy. Reference Format: Nishant Gupta, Shubhnandan S. Jamwal, Devanand Padha (2014). WHLK: Framework for Software Authentication and Protection. Afr J. of Comp & ICTs. Vol 7, No. 1. Pp INTRODUCTION In current research, we introduce a low-cost software protection scheme that is secure, flexible and convenient for users. The scheme is based on Software Watermarking [2], Hardware parameters and License Key to avoid the most common attacks to software protection mechanisms such as multiple installations from a single legal license, reverse engineering analysis, and production of unprotected (pirated) copies of the software. We showed that how this new technique can be applied to build secured applications. The organization of this paper is as follows. In the next section, we have explained the software piracy and the need for the protection of the software. Section 3 elaborates related work in the fields of software protection and watermarking to position our contribution. The Architecture of our Model has been graphically presented in Section 4. Section 5 shows the benefits and improvements of the proposed model, which is followed by the working description of same. The testing and implementation of this model is presented in Section 6. In Section 7, the empirical evaluation of the tested model has been shown. Section 8 analyses the results obtained after empirical tests, and, finally, Section 9 summarizes the conclusions and prospects for future work. 2. SOFTWARE PIRACY There is a new generation of distributed applications, such as distributed object systems, web services, electronic commerce and grid computing, that have the potential to represent substantial advances in the use of Internet resources. However, security problems become an insurmountable barrier for the widespread deployment of those types of applications. Solving software protection problems is not a trivial task. Several issues of research concerning the piracy of software are: Intellectual property protection: The objective is to link the software with information about its author by using techniques such as watermarking [3]. Protection against function analysis: The objective here is to prevent a malicious host from discovering what function is being computed by a software element. Techniques such as code obfuscation [4] or function hiding [5] are used, sometimes complemented by the use of hardware tokens [6]. Software use-control: This is aimed at guaranteeing that only authorized users can run the software according to some contractual conditions. 69
2 The work presented in this paper focuses on all the above mentioned issues. We also discuss the possibilities and implications of protecting software in order to prevent software piracy, and ensure that the software is installed for an intended user only. Software piracy is the unauthorized utilization, replication, and distribution of commercially available or copyrighted software. A report by the Business Software Alliance (BSA, 2012) noted that for the past five years worldwide, software piracy has hovered between 38% - 42% and losses amounted to billions of dollars [7]. The prevalence and significant growth of software piracy in the past four decades since the advent of computer technology has warranted attention of the researchers, software developers, educators, intellectual property advocators etc. Therefore, the fight against software piracy is becoming an extremely important issue for all these stakeholders. Surprisingly, the best results against software piracy in recent years have not come only from new software protection mechanisms but the other reasons for controlling the piracy are: Software companies have tried to have an effective legal sales presence in all areas of the world. Software companies achieved better user support for their legal products. The price of software has come down, narrowing the difference between legal and illegal versions. Some organizations, like the BSA, promoted high profile legal proceedings against companies using illegal software. Governments have cooperated to provide legal protection for intellectual property and to criminalize software piracy. We are now again witnessing an increase in software piracy because of the popularity of the internet. Despite the use of deterrent and preventive measures to combat software piracy this problem seems unabated and it is observed that previous measures will not achieve better results. 3. MOTIVATION AND BACKGROUND In today s computing world, maintaining security is a challenging issue. Customers are expecting security to be delivered out of the box, even on programs that were not designed with security in mind. The challenge is even greater when legacy systems must be adapted to networked/web environments, while they are not originally designed to fit into such high-risk environments. Tools and guidelines have been available for developers for a few years already, but their practical adoption is limited so far. Nowadays, software maintainers must face the challenge to improve program security and are often under-equipped to do so. Addressing issues related to software piracy is an on-going challenge. While software companies and lawmakers have developed and attempted corrective measures to fight the trend of piracy through security design patterns, birthmark, protection schemes, application virtualization, exterior component, secure coding, copy-protected software, product identification key, hardware dongle, the problem of piracy remains prevalent and significant. As for security engineering, it aims at considering security early into the development life cycle of software. A number of Security Design Patterns (SDP) is available in order to guide software engineers in designing their security models and securing their applications at the design phase. When it comes to security hardening against piracy, these proposed security design patterns are not really relevant. The reason is that we are dealing with already developed applications that are, in many cases, deployed. Spyros T. Halkidis et.al [8] tried to achieve this goal by applying specific patterns in software architecture. Here, the well-known design patterns for building well-structured software have been defined, a new kind of patterns called security patterns have emerged. These patterns enable to incorporate a level of security at the design phase of a software system. This proposal is not relevant in the setting of security hardening against piracy since we are dealing with already developed software. The research by Hyun-il Lim et.al [9] proposes a method of detecting the theft of Java programs through analysis of the flow paths (called as FP) of the program, specifically of the FP birthmark which can be used to identify the origin of software by comparing the inherent characteristics of the program. The proposed birthmark is a measure for detecting programs while copying, and can lessen the time and effort required for manual reverse engineering in the identification of software theft. But this method is ineffective if the basic blocks have been decomposed or if the instructions in programs are reordered or changed via modifications. Ibrahim Kamel [10] proposed a technique that detects malicious attacks with high probability on real datasets using reasonable node sizes and attack model. This paper also presented the increase in detection rate of data alteration at the cost of the attack detection. But this scheme was based on a watermarking scheme to be used only for R-tree data structures instead of designing the watermark for other database indexes like B-trees and Quad-trees. Bin Zhao et.al [11] proposed an enhanced watermarking scheme in the encrypted domain with flexible watermarking capacity. This paper demonstrated that the enhanced watermarking scheme eliminates the drawbacks of other watermarking schemes in the encrypted domain. But there is no use of error correcting codes to correct bit errors and improve the robustness of watermark sequence against other severe attacks in the encrypted domain. Several watermarking schemes have been proposed distinctively whether it is viable to hide the information in the program/code itself or dynamically. Xuesong Zhang et.al in his paper [12] proposed a hash function based dynamic software watermarking algorithm which is able to withstand a variety form of transformation attacks. But still there is lack of effective feature code matching and extraction feature to identify the hash function. 70
3 Rafael Augusto Teixeira et.al [13] presented a work for an ondemand software deployment system based on application virtualization concepts which eliminates the need of software installation and configuration on each computer. As many a commercial software still uses the license per installation, it is a real problem in this application streaming solution. Qiang Liu [14] used Exterior Component method which allows only authorized users to run the software. So without this exterior component software cannot be run, and thus they will protect against illegal copying and use of software. Although this method can be applied to some commercial software, it is still at high cost to apply to the personal computer users. Various strategies have been employed to make unauthorized duplication and use of software more difficult [15]. One such approach is to provide a hardware key which is typically installed in the parallel port or USB of the computer to provide a software interlock. If the key is not in place, the software will not execute. This method is relatively expensive for the developer and cumbersome for the authorized user while remaining vulnerable to the theft conducting piracy by duplication of the hardware key. Another approach requires the user to enter a serial number or customer identification number during the installation of the software. Missing or invalid registration information prevents the installation of the software. This approach is easily defeated by transferring the serial number or customer identification number to one or more unauthorized users. Yet another approach requires registering the software with the manufacturer or distributor to obtain an operational code or password necessary for the installation of the software. Again, once the operational code or password is obtained, it may be perpetually transferred along with pirated copies to numerous unauthorized users. Concerning the secure coding approach, it presents either safe programming techniques, or a list of programming errors together with their corresponding solutions [16]. Several publications compiled common errors and vulnerabilities in code production languages such as C/C++. Their intent is to instruct software developers to avoid these errors. Such proposals are not relevant in the setting of security hardening against piracy since we are dealing with already developed software. Moreover, these secure coding practices are very often manually applied and our aim is actually to elaborate a systematic and even preferably automatic approach to security against piracy. Yawei Zhang et.al [17] proposes a software-splitting technique which put the split contents on the client instead of the remote trust server. This new technique would encrypt the extracted contents from the software by a key relating to the hardware characteristics, and then decrypt them dynamically during the main program running. In spite of the usefulness of this technique, it is not stimulating for some explanation programming languages such as VB, JAVA because it s nearly impossible to directly manipulate in the memory for these programming languages. As a result, integrating security into software to prevent piracy is becoming a very challenging and interesting domain of research. Above mentioned research projects motivated to create methods and solutions to integrate systematically secure components into software. Our proposition is inspired by the best and most relevant methods and methodologies found in each one of the aforementioned concepts and approaches. This research provides secure software by hardening framework for installation and registration. The experimental results presented explore the efficiency and relevance of our approach. 4. ARCHITECTURE OF THE WHLK MODEL The model provides an integration of the privacy of users, security of information and license key, together for the control of the piracy. Our system enjoys a modular design and can be implemented by any machine with flexible configurations and windows X operating systems. Furthermore, the proposal allows flexible registration information definition. This Model not only makes it harder to create an additional available copy based on diversity, but also prevents illegal uses on the copy. The architecture of our Model has two phases: Client-Vendor Interaction Design (Phase I): Fig. 1 Installation and Registration Design (Phase II): Fig. 2 71
4 72
5 73
6 5. BENEFITS AND WORKING OF WHLK MODEL (IMPROVED) 5.1 Benefits of WHLK Model The current research is carried out after collecting data from academic as well as industrial sector for finding the most common cause of piracy. Numbers of causes are discussed in the literature and most common cause of piracy found is HardDisk Loading. It is a method of software piracy where hard disk of the new customer is loaded by the vendor of the hardware with the different software available with him. It has been observed that the hard disk loading and softlifting are the common practice of making an illegal copy of the software. We have studied different control measures for curbing the software piracy in Section 3 and no such measure has been found for doing so. We have implemented our technique on different machines with variant configurations and versions of windows X operating system which shows that it is flexible with any of the machines and is not limited to some specially configured machines. An integrated (dual) approach is applied to secure the software from being pirated. Our Model has been designed in two phases including Client-Vendor Interaction Design (Phase I) as shown in Figure 1 and Installation and Registration Design (Phase II) as shown in Figure 2. In phase I, Dynamic Watermarking Algorithm is implemented to annotate, embed, tracer and recognize a watermark (as a component) in the software using SANDMARK, which was proposed by Collberg and Thomborson [18]. Also, the Obfuscation algorithm is applied to encrypt this watermarked file. It helps in encrypting the user identification. An algorithm is used for encrypting the information fetched from the machine and the user in coded form. The unique keys are generated in a randomizing pattern by applying these algorithms in the Installation phase, thus, securing them from being revealed to secondary users. Registration Code (RGCN), in encrypted form, is generated randomly on the basis of unique keys generated through algorithms unlike other registration schemes where registration is done storing the information as it is on the server thereby inviting a risk of being hacked. User information is not at any risk of being misused or misinterpreted elsewhere. A timeframe has been set using an algorithm for those software users who have either formatted their machine or purchased new hard disk or machine. The client can re-use the software on new machines using existing Registration Code (RGC) provided to them during the first installation of watermarked software. No other user installs or uses the software on their machines. The cost of this technique is rather low as compared to others. We don t need any hardware i.e. dongles for the implementation of secured software installation. It is rather convenient for the developers to implement this strategy. 5.2 Working of WWLK Model Noting the weakness in existing approaches of software registration, we incorporated the new processes in the process of software registration. First, instead of preventing from illicit copying, we force the software to be only used by an authorized running environment. In order to accomplish this task, the user is required to submit his identification details which are being applied through algorithms to generate random unique key (string) and this key is embedded as a watermark in the program. Also, an automated program fetches the uniquely identifying characteristics of running environment such as the physical sequence numbers of the CPU, the main board, processor and other hardware information. These hardware characteristics and the License key are integrated to be used as parameters. All of these parameters are encrypted using a pre-defined code generating a new random unique number called as Registration Code (RGCN) which is acknowledged to the user. The working of WHLK has been categorized in two phases: Phase I In this phase, the client is required to provide his personal details to the software vendor including his Name, Affiliation and Social Security Number / ID. This process is the first process for the authorization of software user and represented as Process P in Fig. 1. The details are entered by the user and fetched through Process P1. This Phase enters into a new Process P2. Software vendor applies an automated algorithm on these details to generate a Unique Key (UK). This Unique Key was generated on the basis of programming code extracting certain alphanumeric characters of each of these details randomly. UK is used as a parameter for Sandmark watermarking tool. The Collberg-Thomborson (CT) software watermarking algorithm is applied to embed this key (watermark) into the class files of the software program. This algorithm embeds the watermark into the topology of graph structure built at runtime in response to a sequence of special user actions. To use this algorithm, the calls are embedded to sandmark.watermark.ct.trace.annotator.smmark(*) into the software program. These points represent the locations where watermark code can be inserted. Then run a trace with a special input sequence in SandMark and finally watermark is embedded. The software is watermarked with the key (watermark) and called as Watermarked Software (WS). Before distributing this watermarked software WS to the Client, it is obfuscated to remove the risk of being susceptible to collusive attacks. Then WS is supplied to the client as per his requirement. 74
7 5.2.2 Phase II During the process of installation, an automated process P6 fetches the hardware characteristics of this machine which includes the CPU Identification (ID), Hard Disk ID, MAC ID and Processor Serial Number. These Hardware parameters (HW) are being forwarded to the Hardware Database (D1) for checking their existence in the database. D1 validates the HW and responds in different ways. If all or any of the HW already exists in the database, it means that the user is already registered for the software on the machine with same HW and that he had already received the Registered Code (RGC). In this case, a denial note is acknowledged to the user through process P7.1 asking him to provide with the existing RGC available with him. User provides the RGC and submits it to the Registration Database (D2). Installation processes completes its cycle and the software is ready on machine for use. If user forgets RGC, he has to check inbox for the mail received sent to him during the first installation. In case of user forgetting his ID, he has to use the License Key given by the vendor for re-registration. In extreme case of nonavailability of License key, he has to contact the vendor who can trace the RGC using the user details given to him by the user while purchasing the software. If HW does not exist in D1, it means that the user has not registered yet and a new registration process begins. An acceptance note has been sent through Process P7.2 to pass the hardware parameters to P8.1. Here the process generates a Unique Key (UK1) taking HW to be used as parameters in programming. This Unique Key was generated on the basis of programming code extracting certain alphanumeric characters of each of these hardware parameters randomly. UK1 is being sent through P8.5 to be stored in Key Generation Database (D3). In the next step of installation, the user has to provide his ID (Identification) which is again processed through an automated program of generating a unique key. UK2 has been generated in this step and stored in D3. In addition to this, Process P8.2.1 sends the User ID to the Registration Database through P In its next step, the user has to provide the License key provided by the software vendor while purchasing the software. This License key is being labeled inside the product CD Box. Taking this License key as a parameter, the automated program does the process of generating the Unique key (UK3). UK3 has been sent to D3 for storage. Process P8.4 receives UK1, UK2 and UK3 from D3 to concatenate them in a pre-defined sequenced manner and then generates a Unique Key (UKM). This Key is generated in a programmed way using the algorithm designed. Algorithm is applied taking UKM as a parameter and its different positioning values. A new code occurs which is called as new registration Code (RGCN) for the user. The generation of RGCN is well disguised of its original values and is in encrypted code. Process P10 stores RGCN in the Registration Server D2. P11 receives RGCN (in coded form) from D2 and acknowledges it to the ID of the user. Before sending it to the ID, it verifies it with the user and then sends RGCN to the ID of the user in coded form. With this installation process completes and software is ready for the use. The sequence of steps proves that the software has been installed on a genuine and authenticated machine. 6. IMPLEMENTATION AND TESTING This Section has two parts: Implementation and Testing 6.1 Implementation The proposed model has been implemented by watermarking of Java bytecode within the SandMark software protection research framework. Our implementation consists of five phases Annotations take the form of extra method calls added to the source code. In this phase, calls to sandmark.watermark.ct.trace.annotator.smmark(*) are added to scprog.java, which is the source program of application software, in suitable locations to insert watermarking code. Then scprog.java is compiled and packaged into a jar-file scprog.jar. The methods also write messages to a tracing log while they are in execution In the tracing phase, the dynamic behavior of the program is determined by tracing its execution path on a particular input sequence (the secret watermarking key). The jar file of source program is traced, i.e. run with a special (secret) input sequence. This constructs a trace-file, a sequence of mark() calls, that were encountered during the tracing run The next phase is embedding phase where the watermark is actually added to the program, using the data from the tracing run. After generating trace file, we have started embedding watermarks. We have provided our own watermark which consists of customer name, affiliation and identification number. The output of the embedding module is a new watermarked jar-file scprog_wm.jar. Other files generated during the execution are: Watermark.dot has been generated which is the watermark graph (in the dot format) embedded into the application software. Traceforest*.dot are generated call-graphs during tracing. Watermark.java is a generated class file containing the watermark-building methods. 75
8 6.1.4 The next phase is Obfuscation phase, where scprog_wm.jar is being obfuscated using the Class Encrypter Obfuscating Algorithm. This algorithm encrypts the file using an encryption key and causes them to be decrypted at runtime. The output of the obfuscator is a new watermarked jar-file scprog_obf.jar. This program is served as input to the recognizer In the recognition phase, the scprog_obf.jar is traced again (using the same secret input), and the branch sequence is checked for the watermark. 6.2 Testing Our technique has been tested on different machines with different configurations and versions of windows X operating system to check its reliability, accuracy and integrity. Firstly the watermarked software has been installed on the client machine and then the process of validation on the server for its authentication and security are carried out Client-Side Installation The testing of our technique starts with an executable file running a sequence of steps for installing the software on the client machine. Hardware parameters are extracted from the machine and submitted to the server for validation. This process has been done with an algorithm designed for executing these validation checks on server. In next step, the user identification and License Key, provided with the software pack, is collected, fetched, integrated and processed at different steps. An algorithm, which is designed for generating unique keys randomly, is being applied on this integrated information. Then this information is being submitted and stored at the server and registration code (encrypted code) is generated which is being acknowledged to the client. The process of installation finishes after completing all its steps and the software is ready for use. This is an automated program designed with different algorithms and program codes. This phase secures the authenticity and usage of the software Server-Testing Server side testing algorithms are designed to test and validate the data provided by the user, generated on client-side machine during installation process. Algorithm for validating the hardware parameters fetched by the client machine Algorithm for securing the registration codes submitted by the client machines Algorithm for acknowledging the newly generated registration code to the of client in encrypted code securing it from being tampered with or being hacked and cracked. 7. EMPIRICAL EVALUATION 7.1 Evaluation In Phase I We evaluated the watermarking scheme for Java bytecode described in Section 6.1 using an implementation built on top of SandMark, a collection of obfuscation and watermarking algorithm implementation for Java bytecode. The system reads in Java archives (jar-files), applies one obfuscation and watermark, and writes the resulting code to another Java archive. We used 270 jar files with CT Dynamic watermarking algorithm for our experiments. A high percentage of the instructions in these jar files are executed frequently. After all the programs have been transformed, we extracted the watermarks from the programs. We expect that many watermarks will be lost during the transformations and attempt to find the affect of transformations on watermarks The Watermarker We are testing CT dynamic watermarking algorithm from Sandmark watermarking systems. Sandmark is an academic framework and it is the only available system for watermarking Java programs Sandmark SandMark is a tool [19] developed by Christian Collberg et al. at the University of Arizona for research into software watermarking, tamper-proofing, and code obfuscation of Java bytecode. The project is open-source and both binaries and source-code can be downloaded from the SandMark homepage [19]. We used version (Mystique) released in The Jar Files All the jar files that we use in the tests are plugins for the text editor jedit [20]. These files are fairly small (average 40KB) but represent a collection of real-world Java software. The range of plugins represents a variety of code, and were all written by different programmers but as they are plugins they share some characteristics. For example, some classes may subclass jedit s abstract plugin classes to use jedit s plugin API. All the test files were obtained by installing jedit and then using the built-in plugin manager to download the plugin jar files. The average number of classes per jar is 10, while the average number of methods per jar is 77. The average number of fields is 25 and the average number of local variables is 175. The biggest program jar was 742 KB while the smallest was 1.7KB. The largest program jar had 171 classes and the smallest had only 1. Two programs had no fields while the largest program contained 523. The largest program contained 3004 local variables. 76
9 7.2 Evaluation in Phase II We evaluated the installation process of the software dynamically as described in Section 6.2 through the empirical analysis of the algorithms for validation checks on server, generating the unique keys, concatenating the unique keys generated and, lastly, generating the Registration code. We have installed the software on 198 machines with different configurations, versions of windows X operating system and platforms Validating Hardware Information We have tested Validate algorithm for checking whether the hardware parameters fetched exists in the database or not. In some machines, they exist on the database, the instructions have been sent to the client to enter the already provided registration code and submit to the server for Re-registration. The remaining machines complete the rest of installation process Generating the Unique Keys We have tested Gen algorithm for generating the unique keys fetching the characters position wise randomly as programmed in the source code. Hardware information has been fetched and an algorithm has been tested on this information generating a unique key (random number) called as UK1. UK1 has been submitted and stored on SQL Server Key Generation Database D3. Then the algorithm has been tested for verification. Another unique key UK2 has been generated and stored on D3. Also, the ID (in original form) has been sent and stored on Registration Database D2. Lastly, the License Key has been fetched from the user (provided by the software vendor). Further, the algorithm has been tested on this information and a unique key UK3 has been generated which is submitted to the database D Generating the Registration Code We have tested Con algorithm for concatenating these three unique keys UK1, UK2 and UK3. After this, we have applied the Gen algorithm on this new parameter derived after using the Con algorithm. A new registration Code called as RGCN has been generated and stored on the database D2. 8. RESULTS 8.1 Observed Results of Evaluation Phase I After embedding watermarks we obtained 259 out of an expected 270 watermarked jars. 11 watermarked jar files failed to embed the specified watermark, due to error or incompatible program jar. The Collberg-Thomborson (CT) algorithm managed to correctly embed watermarks in all 270 test programs - they were embedded, obfuscated and recognized correctly. Exactly 95.92% of the expected watermarked jar files were actually produced (Fig. 3). Out of the 259 watermarked jar files all 257 contained watermarks which were successfully obfuscated and recognized. 2 out of 259 watermarked jar files could not be recognized as the input key is not available with the client. This means that 99.22% of the watermarks in the watermarked jar files produced were actually recognized (Fig. 4). 8.2 Observed Results of Evaluation Phase II After testing Validate algorithm on 198 machines, we found that 38 machines have been already registered for this particular software which means that hardware parameters of 38 machines were found on the server. Instructions were sent to these 38 machines to re-submit their registration code already available with them. Statistically, 19.19% clients were found already registered for using this software (Fig. 5). When the rest of installation process was being run through the 160 machines, we found that 6 clients have forgotten the details of their IDs and 13 clients have lost their License Key. These 19 (adding 13 and 6) clients were not able to complete their installation process. Only 11.87% of clients were not successful in their installation process. A high percentage of 88.12% of clients were able to receive RGCN and install the software on their respective machines (Fig. 6) Acknowledging RGCN We have tested the Sec algorithm on RGCN to be encrypted and then this encrypted RGCN has been acknowledged to the E- Mail ID of the user. After testing all these steps, we have successfully installed software on the machine for a genuine user in a secured environment. All tests were run using Sun s JVM version and Windows X operating systems. 77
10 Results of Registration Watermarks Embeds Fig. 3 Successful Failed Clients without ID Clients without License key Clients receiving RGCN Fig. 6 Watermarks recognises Registration Fig. 4 Successful Failed Clients already registered New clients to be registered 9. CONCLUSION AND FUTURE SCOPE 9.1 Conclusion In this paper we present an approach that illustrates our proposition and methods to harden security into applications. This approach, which is based on Software Watermarking, simplifies security hardening by maintainers and allows developers to perform security hardening of software by providing an abstraction over the actions required to improve the security of programs. We have taken this approach as a measure to control the software piracy which is very commonly prevalent in our technological world. Our model consists of dual aspects. First aspect, occurs at the software vendor side, includes the implementation of dynamic software watermarking in the software program. WHLK offers easy embedding of watermark without affecting the data and control structure of original program and also shield the watermarked program from collusive attacks using obfuscation algorithm. Second aspect, which occurs at the client machine, fetches the information, processes them using encryption algorithms designed and then submits them to the server for validation. Server validates and puts acceptance to the client by registering its details and acknowledges it to him for software use. We conclude that our watermarking system would mitigate and nullify the threat of unauthorized distributions of copyright software by its secondary users. Fig. 5 78
11 9.2 Future Scope In future, we would like to focus on the following work. Our Model, in its second phase, needs Internet connectivity to complete its process which can be constraint. The techniques can be developed to remove this constraint of Internet. Our scheme works for only HardDisk Loading type of software piracy. We would like to extend the scheme for other types of software piracy like OEM Unbundling, Softlifting, and Corporate Software Piracy. We would like to apply and extend our scheme to other platforms like.net framework and to carry out experimentation on these machines. REFERENCES [1] N. Gupta, S.S. Jamwal and Devanand, Watermark, Hardware Parameters and License Key : An Integrated approach of Software Protection, Int. J. of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 5, pp , May [2] J. Hamilton and S. Danicic, An Evaluation of the Resilience of Static Java Bytecode Watermarks Against Distortive Attacks, Int. J. of Computer Science, International Association of Engineers (IAENG), HongCong, vol. 38, no. 1, pp. 1-15, [3] W. Zhu, C. Thomborson and F. Wang, A Survey of Software Watermarking, in Proceedings Of IEEE Int. Conf. on Intelligence and Security Informatics, Springer-Verlag Berlin Heidelberg, Germany. LNCS 3495, pp , [4] A. Kulkarni and S. Lodha, Software Protection through Code Obfuscation, Project Report. Tata Research Development and Design Centre: Pune, [5] I. Kamel and Q. Albluwi, A robust software watermarking for copyright protection, Computers and Security, Elsevier, vol. 28, no.6, pp , [6] V. K. Sharma, S.A.M. Rizvi, S.Z. Hussain and A.S. Chauhan, Dynamic Software License Key Management Using Smart Cards, in Proceedings of Int. Conf. on Advances in Computer Engineering, IEEE Computer Society, pp , [7] Business Software Alliance, Ninth Annual BSA Global Survey of PC User Attitudes, 2012, Available: ( df/2011_bsa_piracy_study-standard.pdf) [8] S. T. Halkidis, A. Chatzigeorgiou and G. Stephanides, A qualitative analysis of Software security patterns, Computers and Security, Elsevier, vol. 25, pp , [9] H. Lim, H. Park, S. Choi and T. Han, A method for detecting the theft of Java programs through analysis of the control flow information, Information and Software Technology, Elsevier, vol. 51, pp , [10] I. Kamel, A scheme for protecting the integrity of databases, Computers and Security, Elsevier, vol. 28, pp , [11] B. Zhao, W. Kou, H. Li, L. Dang and J. Zhang, Effective watermarking scheme in the encrypted domain for buyer seller watermarking protocol, Information Sciences, Elsevier, vol. 180, pp ,
12 [12] X. Zhang, F. He and W. Zuo, Hash Function Based Software Watermarking, in Proceedings of Advanced Software Engineering & its Applications, IEEE Computer Society, China, pp , 2008, doi= /asea [13] R. A. Teixeira, M. A. Cavenaghi, R. S. Lobato and R. Spolon, Proposal of an On-Demand Software Deployment System based on Application Streaming, Virtualization Techniques and P2P Transport, in Proceedings of Second Int. Conf. on Recent Trends in Wireless and Mobile Networks, Communications in Computer and Information Science, Springer-Verlag, Berlin Heidelberg, vol. 84, pp , [14] Q. Liu, Techniques Using Exterior Component against Software Piracy, Department of Computer Science, University of Auckland, New Zealand. [15] I.J. Jozwiak and K. Marczak, A Hardware-Based Software Protection Systems Analysis of Security Dongles with Time Meters, in Proceedings Of 2nd Int. Conf. on Dependability of Computer Systems, IEEE Computer Society Washington, DC USA, pp , [16] D. Wheeler, Secure programming for Linux and Unix HOWTO creating secure software v3.010, 2003, < >, [accessed April 2007]. [17] Y. Zhang, L. Jin, X. Ye and D. Chen, Software Piracy Prevention: Splitting on Client, in Proceedings of Int. Conf. on Security Technology, IEEE Computer Society, Washington, DC, USA, pp , [18] C. Collberg, G. Myles and A. Huntwork, SandMark A tool for software protection research, in IEEE Magazine of Security and Privacy, vol. 1, no. 4, [19] C. Collberg, Sandmark, Department of Computer Science, 2004, Available: [20] world-wide developer team, jedit - programmer s text editor, 2010, Available: http: // 80
Lecture 12: Software protection techniques. Software piracy protection Protection against reverse engineering of software
Lecture topics Software piracy protection Protection against reverse engineering of software Software piracy Report by Business Software Alliance for 2001: Global economic impact of software piracy was
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
Application of Neural Network in User Authentication for Smart Home System
Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Device-based Secure Data Management Scheme in a Smart Home
Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
Software Protection through Code Obfuscation
Software Protection through Code Obfuscation Dissertation submitted in partial fulfillment of the requirements for the degree of Master of Technology, Computer Engineering by Aniket Kulkarni Roll No: 121022016
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
Trusted Platforms for Homeland Security
Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Research and Design of Universal and Open Software Development Platform for Digital Home
Research and Design of Universal and Open Software Development Platform for Digital Home CaiFeng Cao School of Computer Wuyi University, Jiangmen 529020, China [email protected] Abstract. With the development
Software Piracy Overview of Anti-Tampering Technologies. Scott Baeder Sr. Architect Cadence Design Systems baeder@cadence.
Software Piracy Overview of Anti-Tampering Technologies Scott Baeder Sr. Architect Cadence Design Systems [email protected] 0 Agenda Quick Review of Piracy Binary Hacking Crackers Workflow First Impressions
What is Software Watermarking? Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks
hat is Software atermarking? Software atermarking Through Register Allocation: Implementation, Analysis, and Attacks Ginger Myles Christian Collberg {mylesg,collberg}@cs.arizona.edu University of Arizona
(C) Global Journal of Engineering Science and Research Management
DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.
Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents
Code Obfuscation. Mayur Kamat Nishant Kumar
Code Obfuscation Mayur Kamat Nishant Kumar Agenda Malicious Host Problem Code Obfuscation Watermarking and Tamper Proofing Market solutions Traditional Network Security Problem Hostile Network Malicious
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
Systems Software. Introduction to Information System Components. Chapter 1 Part 2 of 4 CA M S Mehta, FCA
Systems Software Introduction to Information System Components Chapter 1 Part 2 of 4 CA M S Mehta, FCA 1 Systems Software Learning Objects Task Statements 1.1 Identify deployment of different components
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud
Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud K.S. Aswathy 1, G. Venifa Mini 2 1 M.E. Student, 2 Assistant Professor, Computer Science and Engineering, Noorul
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones Pramote Kuacharoen School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi,
Detection and mitigation of Web Services Attacks using Markov Model
Detection and mitigation of Web Services Attacks using Markov Model Vivek Relan [email protected] Bhushan Sonawane [email protected] Department of Computer Science and Engineering, University of Maryland,
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
RE-TRUST Design Alternatives on JVM
RE-TRUST Design Alternatives on JVM ( - Italy) [email protected] http://softeng.polito.it/falcarin Trento, December, 19 th 2006 Tamper-Detection Tamper-detection goals Detect malicious modifications
WATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
SecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007
Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007 SIEMENS AG Industry Sector Industry Automation D-76181 Karlsruhe, Federal Republic of Germany E-mail: [email protected] Fax: +49
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
Integration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
Client Side Filter Enhancement using Web Proxy
Client Side Filter Enhancement using Web Proxy Santosh Kumar Singh 1, Rahul Shrivastava 2 1 M Tech Scholar, Computer Technology (CSE) RCET, Bhilai (CG) India, 2 Assistant Professor, CSE Department, RCET
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
A Secure Authenticate Framework for Cloud Computing Environment
A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
Online Data Services. Security Guidelines. Online Data Services by Esri UK. Security Best Practice
Online Data Services Security Guidelines Online Data Services by Esri UK Security Best Practice 28 November 2014 Contents Contents... 1 1. Introduction... 2 2. Data Service Accounts, Security and Fair
A Tokenization and Encryption based Multi-Layer Architecture to Detect and Prevent SQL Injection Attack
A Tokenization and Encryption based Multi-Layer Architecture to Detect and Prevent SQL Injection Attack Mr. Vishal Andodariya PG Student C. U. Shah College Of Engg. And Tech., Wadhwan city, India [email protected]
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
Oracle Business Intelligence Enterprise Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on Oracle Enterprise Linux 4 update 5 x86_64
122-B CERTIFICATION REPORT No. CRP250 Business Intelligence Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on update 5 Issue 1.0 June 2009 Crown Copyright 2009 All Rights Reserved Reproduction
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Two SSO Architectures with a Single Set of Credentials
Two SSO Architectures with a Single Set of Credentials Abstract Single sign-on (SSO) is a widely used mechanism that uses a single action of authentication and authority to permit an authorized user to
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
A Scheme for Implementing Load Balancing of Web Server
Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public
EnduraData Cross Platform File Replication and Content Distribution (November 2010) A. A. El Haddi, Member IEEE, Zack Baani, MSU University
1 EnduraData Cross Platform File Replication and Content Distribution (November 2010) A. A. El Haddi, Member IEEE, Zack Baani, MSU University Abstract In this document, we explain the various configurations
Smart Shopping- An Android Based Shopping Application
Smart Shopping- An Android Based Shopping Application 1 Adarsh Borkar, 2 Madhura Ansingkar, 3 Monali Khobragade, 4 Pooja Nashikkar, 5 Arti Raut 1,2,3,4 Department of Computer Science and Engineering, 5
Project management integrated into Outlook
Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: October 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, [email protected] Gitanjali Dabhade Monika Ghodake Gayatri
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
Multi-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
SIPAC. Signals and Data Identification, Processing, Analysis, and Classification
SIPAC Signals and Data Identification, Processing, Analysis, and Classification Framework for Mass Data Processing with Modules for Data Storage, Production and Configuration SIPAC key features SIPAC is
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Experimental DRM Architecture Using Watermarking and PKI
Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,
Installing and Using the vnios Trial
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
