The Community for Technology Leaders
Computer Science and Information Engineering, World Congress on (2009)
Los Angeles, California USA
Mar. 31, 2009 to Apr. 2, 2009
ISBN: 978-0-7695-3507-4
pp: 636-638
There have been many methods to protect the commercial software from being cracked. But the crackers can always skip the protecting part through analyzing the assembly code of the software. A new protecting method is presented here. It breaks the original software into two parts. A part which is so important that it can’t be skipped, called key process of computing, is put at the remote server side and the rest runs on the local machine as usual. When the software runs into the departed part, it must call the remote part through RPC to get the right answer and goes on. We can see, in this method, the cracker can’t get the execution code of the remote part and he also can’t just skip the remote part. So the only way to crack the software protected by this method is to reimplement the key process of computing. If the key process of computing we select is complicated enough, to do it will be such a great work not less than reimplementing the whole software. This method is also easy to be deployed. The commercial software can be distributed by the internet and that is the cheapest way so far. The only shortcoming of it is that when the software is running, the machine must be connected onto the internet. That may not be a big problem when the internet can be connected to everywhere now.
software, cracking, protecting

J. Zhao, N. Yao and S. Cai, "A New Method to Protect Software from Cracking," 2009 WRI World Congress on Computer Science and Information Engineering, CSIE(CSIE), Los Angeles, CA, 2009, pp. 636-638.
94 ms
(Ver 3.3 (11022016))