engineer 2010

20
A TECHNOLOGICAL SALVO FOR ANTI- SOFTWARE PIRACY Vijesh C M, T Dheeraj, Ashfaq N K 23 October 2010

Upload: dheeraj-thunoli

Post on 12-Apr-2017

449 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Engineer 2010

A TECHNOLOGICAL SALVO FOR ANTI-

SOFTWARE PIRACYVijesh C M, T Dheeraj, Ashfaq N K23 October 2010

Page 2: Engineer 2010

Software Piracy Rate & Commercial Value of Unlicensed Software

Overall Piracy Rate 2005: 35% 2009: 43%

Page 3: Engineer 2010

Overall Commercial Value 2005: $ 34,482 2009: $ 51,411

Page 4: Engineer 2010

Present Anti-Software Piracy Techniques File Encryption Security Dongles Genuine Advantage

Notification Copyright Laws

Page 5: Engineer 2010

Why Is Then Piracy Still So Predominant?

Reverse Engineering: Software Cracking

Bypassing Product Key CheckBypassing GANModifying Softwares ExecutableCrack Time Controlled Softwares Counterfeit Product Keys

Software Keygen

Page 6: Engineer 2010

EMERGENCE OF UNIVERSAL PIRACY MONITORING SYSTEM

Page 7: Engineer 2010

UPMS Highlights

Track Even After Cracking (Counterfeit) Zero Hardware Upgrade Hack Proof Stops Software Piracy From Its Root

Page 8: Engineer 2010

UPMS Implementation

Client Side (TROPS) ISP UPMS Server Software Vendors Server

Page 9: Engineer 2010

TROPS Installation

Page 10: Engineer 2010

After TROPS Installation

TROPSPacket

InternetAccess

Page 11: Engineer 2010

UPMS In Action TROPS DATA:•Product ID•Product Version•Product Key•GUID•Hash•IP Address•Time(By UPMS Server)•TROPS ID

UPMS Server DB:•Product ID•Product Version•Product Key•GUID•Hash•IP Address•Time•TROPS ID•Software Status

Page 12: Engineer 2010

Is UPMS Hack Proof ?

No Client Logs UGAN Redirected As Webpage MAC Address Spoof Proof

Page 13: Engineer 2010

Limitations & Solutions

Limited to Online Users Standalone App. for offline users

ISP Approval Mandatory UPMS Certification

Page 14: Engineer 2010

Concept of Software Cafes UPMS in the top of chain

FUTURE OF SOFTWARE ECOSYSTEM

Page 15: Engineer 2010

QUESTIONS?

[email protected]

Page 16: Engineer 2010

Is UPMS Hack Proof?HashWhat If Firewall Blocks TROPS ?Software Validation

Page 17: Engineer 2010

Is UPMS Hack Proof ?

No Client Logs UGAN Redirected As Webpage MAC Address Spoof Proof

Page 18: Engineer 2010

HASHFile FingerprintAlgorithms: Message-Digest Algorithm 5 (MD5) Secure Hash Algorithm 1 & 2 (SHA-1,SHA-2)

SHA-1:8684485fc1e8562e928d3ce8cbf3e5aa

Page 19: Engineer 2010

Firewall

FIREWALL

Page 20: Engineer 2010

Software Validation

Product IDProduct KeyGUID

Software Vendors Webserver