CURBING SOFTWARE PIRACY IN DEVELOPMENT ENVIRONMENT USING CODE SPLITTING, OBFUSCATION AND FINGERPRINTING TECHNIQUES

dc.contributor.authorMUHAMMAD, Aliyu Kufena
dc.date.accessioned2017-11-14T07:55:02Z
dc.date.available2017-11-14T07:55:02Z
dc.date.issued2016-11
dc.descriptionA DISSERTATION SUBMITTED TO THE SCHOOL OF POSTGRADUATE STUDIES, AHMADU BELLO UNIVERSITY, ZARIA. IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE AWARD OF A DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE. DEPARTMENT OF COMPUTER SCIENCE, FACULTY OF PHYSICAL SCIENCES, AHMADU BELLO UNIVERSITY, ZARIA NIGERIAen_US
dc.description.abstractSoftware Piracy has become a major problem for businesses and its widespread in many parts of the world leads to financial losses and harm to consumers. These problems caused the deployment of many security techniques to control piracy. A lot of researches have been done on software security techniques but unfortunately protecting software source code in development environment has been a challenge for software companies as software source codes are not yet transformed to unreadable codes. Therefore, software piracy emanating from development environments, mostly by insiders, has been a big problem to tackle because the prevalent software protection techniques were primarily developed for use at production stage. Based on the literature review, no research was found on piracy reduction in development environment. In this research work an architecture has been proposed and implemented based on design obfuscation that enables tracking pirated standalone software at development stage using the hardware and software aspects, online or offline, and tracing vulnerable PCs within a company. Code Splitting, obfuscation and fingerprinting techniques were used to design the proposed architecture. Two examination results processing software: ExamsLOGIC 2.0 and ELogicPLUS were used to test the proposed architecture for existing and new applications respectively. The result was compared with the result of the reviewed work and found to be improved. For both the two applications, it was found that the proposed architecture is feasible and effectiveen_US
dc.identifier.urihttp://hdl.handle.net/123456789/9373
dc.language.isoenen_US
dc.subjectCURBING SOFTWARE PIRACY,en_US
dc.subjectDEVELOPMENT ENVIRONMENT,en_US
dc.subjectCODE SPLITTING,en_US
dc.subjectOBFUSCATION,en_US
dc.subjectFINGERPRINTING TECHNIQUES,en_US
dc.titleCURBING SOFTWARE PIRACY IN DEVELOPMENT ENVIRONMENT USING CODE SPLITTING, OBFUSCATION AND FINGERPRINTING TECHNIQUESen_US
dc.typeThesisen_US
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Dissertation_final-Reviewed-Corrected-Reviewed_final.pdf
Size:
1.78 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.62 KB
Format:
Item-specific license agreed upon to submission
Description:
Collections