12
Safeguarding the Integrity of Expiration Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs. Algorithms in Trial Versions of Software Programs. Kevin M. Arvin Kevin M. Arvin CS 689 CS 689

Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs

Embed Size (px)

DESCRIPTION

Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs. Kevin M. Arvin CS 689. Problem Statement. - PowerPoint PPT Presentation

Citation preview

Page 1: Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs

Safeguarding the Integrity of Expiration Algorithms in Trial Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs.Versions of Software Programs.

Kevin M. ArvinKevin M. Arvin

CS 689CS 689

Page 2: Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs

ProblemProblem StatementStatement

In order to expose their products to a wider audience, many In order to expose their products to a wider audience, many commercial and independent software developers release time limited trial commercial and independent software developers release time limited trial versions of their software. versions of their software.

While this practice can increase sales, a number of individuals have While this practice can increase sales, a number of individuals have developed methods to circumvent the trial versions’ protection algorithms called developed methods to circumvent the trial versions’ protection algorithms called “cracks”. The cracks are being widely distributed on the Internet allowing anyone “cracks”. The cracks are being widely distributed on the Internet allowing anyone to obtain the software without compensation to the developers.to obtain the software without compensation to the developers.

Page 3: Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs

BackgroundBackground

•Try before buy approach introduced with sharewareTry before buy approach introduced with shareware

•Commercial Programs have adopted the approachCommercial Programs have adopted the approach

•Expiration algorithms are usually not effectiveExpiration algorithms are usually not effective

•Cracks are readily available on the InternetCracks are readily available on the Internet

Page 4: Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs

Research ObjectivesResearch Objectives

A number of individuals who “crack” programs publish tutorials on the Internet A number of individuals who “crack” programs publish tutorials on the Internet that explain how they do it.that explain how they do it.

Our goal is to use these pages to develop methods to protect Our goal is to use these pages to develop methods to protect the evaluation versions’ trial periods.the evaluation versions’ trial periods.

Page 5: Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs

Benefits of the ResearchBenefits of the Research

In this project, we will examine those web pages and attempt to In this project, we will examine those web pages and attempt to counter counter their methods one by one. If successful, we should be their methods one by one. If successful, we should be able to produce a set of able to produce a set of program design recommendations and program design recommendations and algorithms that will make software uncrackable.algorithms that will make software uncrackable.

Programmers would receive the revenue they deserve for their work.Programmers would receive the revenue they deserve for their work. Increased developer income should lead to better quality software.Increased developer income should lead to better quality software. Increased sales will result in lower prices for consumers.Increased sales will result in lower prices for consumers. Increased sales should result in better technical support.Increased sales should result in better technical support. Increased profits will result in a larger number of programs being produced.Increased profits will result in a larger number of programs being produced. Porting applications to less popular platforms may become feasible.Porting applications to less popular platforms may become feasible. Will help start-ups with limited resources be successful.Will help start-ups with limited resources be successful. Should lead to increased competition in the software industry.Should lead to increased competition in the software industry.

Page 6: Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs

Research MethodologyResearch MethodologyData-Gathering PhaseData-Gathering Phase

The project will recruit participants from the following sources:The project will recruit participants from the following sources:

• Professional developers.Professional developers.• University faculty.University faculty.• Graduate level computer science students.Graduate level computer science students.• Undergraduate computer science students.Undergraduate computer science students.

Participants will examine the cracking tutorials, catalog all the Participants will examine the cracking tutorials, catalog all the methods used, and devise new methods to counter each one.methods used, and devise new methods to counter each one.

Page 7: Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs

Research MethodologyResearch MethodologyTesting PhaseTesting Phase

A test program will be created.A test program will be created.

Page 8: Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs

Research MethodologyResearch MethodologyAreas Excluded from ResearchAreas Excluded from Research

• Issues related to specific development environments.Issues related to specific development environments.

• Issues related to specific programming languages.Issues related to specific programming languages.

• Issues related to operating systems other than MS Windows.Issues related to operating systems other than MS Windows.

• Hardware solutions.Hardware solutions.

• Solutions that require proprietary technology.Solutions that require proprietary technology.

• Platforms other than the IBM compatible PC.Platforms other than the IBM compatible PC.

• Alternate distribution and registration strategies.Alternate distribution and registration strategies.

Page 9: Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs

Future Areas of ResearchFuture Areas of Research

Any or all of the excluded areas are suitable for further research.Any or all of the excluded areas are suitable for further research.

If the research is successful, someone will eventually find a way to defeat its If the research is successful, someone will eventually find a way to defeat its recommendations. At that time the project will need to be repeated.recommendations. At that time the project will need to be repeated.

Page 10: Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs

DeliverablesDeliverables

The final product(s) of the research cannot be determined at this time. However, The final product(s) of the research cannot be determined at this time. However, the project will probably produce the following:the project will probably produce the following:

• Source CodeSource Code

• Program design recommendationsProgram design recommendations

Page 11: Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs

Project ScheduleProject Schedule

Page 12: Safeguarding the Integrity of Expiration Algorithms in Trial Versions of Software Programs

Questions ?Questions ?

Ask them now,Ask them now,

Or send them to: [email protected] send them to: [email protected]