Utilizing Reverse Engineering in Tracking Software to diagnose its weaknesses

Authors

  • Rana Jumaa Al-janabi Al-Qadesya University, College of Medicine
  • Hawraa Adil Nori Babylon University- Computer Center

Abstract

In this research, Video Cutter Software was analyzed and that software uses a well known protection method called "User Name and Registration Number". This software uses kind of complicated key generating algorithm. The analyzer hits upon the protection routine of interested software and adds suitable code to them. In other words, he discovers where in memory the entering data is stored and then to find out what is done with it. In this research, a merge technique was adopted between code injection and key generation i.e. (code is added to the execution file) in order to make the software itself browse  message that contains registration number and  this is in turn would consume less time than expected in analyzing (for key generation algorithm). Also, this research discusses how to support software protection by using anti-reverse engineering techniques to prevent crackers from license code stealing.

Downloads

Download data is not yet available.

Downloads

Published

2017-08-31

How to Cite

Jumaa Al-janabi, R., & Adil Nori, H. (2017). Utilizing Reverse Engineering in Tracking Software to diagnose its weaknesses. Journal of Al-Qadisiyah for Computer Science and Mathematics, 1(2), 71–83. Retrieved from https://jqcsm.qu.edu.iq/index.php/journalcm/article/view/200

Issue

Section

Math Articles