Featured Article from Software Monetization
Software Monetization: Countering Piracy Threats
As mentioned in previous columns, a software protection solution is necessary to help reduce the use of unlicensed software.For every $100 worth of legitimate software sold, an additional $75 worth of unlicensed software also made its way into the market, generating absolutely no revenue for the original ISV (independent software vendor), according to the Business Software Alliance (BSA)/IDC 2010 Piracy Impact Study.
A recent SafeNet (News - Alert) whitepaper, From Software Hack to Counterattack, examines a variety of the most common application hacking techniques and the best counterattacks for protecting applications from piracy. Patching executable files and dynamically linked libraries is one such anti-hacking tactic.
“The most convenient way to protect a large number of executable and dynamically linked libraries is by using automatic protection tools also known as ‘packers,’” the whitepaper stated. “The most effective tools also offer anti-piracy specific measures such as anti-debugging mechanisms, executable file encryption and data file encryption mechanisms allowing the protected application to encrypt and decrypt data files on-the-fly.”
SafeNet also offers general software protection strategies for publishers employing hardware-based protection keys, including the following best practices:
Use Both the API-based implementation and automatic protection – Maximize security by using the API (application programming interface) to implement calls to the software protection keys, and protect the program with an automatic protection tool that offers anti-debugging and anti-reverse engineering measures. According to SafeNet, using one protection method does not preclude the use of the other.
Insert multiple calls in your code – Inserting many calls to the protection key throughout the code and binding key data with software functionality frustrates those attempting to crack your software. Multiple calls increase the difficulty in tracing a protection scheme.
Encrypt/decrypt data using the protection key’s on-chip encryption engine – The encryption process, which takes place before distributing the software, and the decryption processes, which take place during run-time of the protected application.
Only when both the security infrastructure and its implementation are maximized is the software truly protected, according to SafeNet.
“This may sound like an enormous task to accomplish, and while it is by no means trivial, it is definitely achievable,” the whitepaper stated. “Implementing effective protection can not only increase your product’s longevity, but it can also significantly increase your company’s revenue, making it well worth the effort.”
Edited by Peter Bernstein
Software Monetization eBooks
Featured Case Studies
- Apollo Communications Protects its Intellectual Property and Enforces Software Licensing with Gemalto Sentinel
- Cadac Group Cuts Operational Expenses & Gains Licensing Flexibility with Gemalto Sentinel
- Sentinel LDK Assures Revenue, Expands Licensing Flexibility, and Reduces System Management Costs for CAD Software Company
- Softing Industrial Automation Works with Gemalto Sentinel to Monetize the IoT
- Miko Maximizes Software Revenue & Reduces Operational Expenses with Gemalto Sentinel
- Xsens Technologies Streamlines Operations & Expands Revenue with Sentinel
- Structural Test and Monitoring Software Protected by Sentinel Integrated with NI LabVIEW
- Seize the IoT Opportunity
- Format International Replaces Inflexible Software Protection and Licensing Dongles with Sentinel LDK with EMS
- Envitrans Reduces Software Piracy & Expands Revenue with Sentinel LDK and Sentinel EMS Business Challenges
- Snell Protects Valuable IP and Streamlines Licensing Operations with Sentinel RMS & EMS
- Following Several Acquisitions, Sage Implements Sentinel RMS to Harmonize a Multitude of Disparate Licensing Systems- existing on site now
- With SafeNet Sentinel, AEOL Protects their Market-leading Training Software while Driving Back-office Efficiencies- existing on site now
Featured White Papers
- Frost & Sullivan - Penny Wise, Pound Foolish: The Fallacies of Choosing to Build vs Buy a Software Monetization System
- NEW! Frost & Sullivan - Competitive Analysis of the Software Licensing and Monetization Market
- NEW! IDC Cloud-Based Software Adoption Delivering Value to Customers
- Frost & Sullivan - Get Connected to Profit: Embracing Software Propels Growth in IoT Era
- More Variety with Less Cost: Using Software Features to Achieve Product Differentiation
- Monetizing the IoT: Show Me the Money: A Grey Heron white paper sponsored by Gemalto
- Cloud-Based Software Licensing - A THINKstrategies white paper: Enabling Operational Efficiency, Delighted Customers and Sustainable Competitiveness
- Consolidating Software Licensing Technologies Post M & A: A survival guide for software publishers & intelligent device manufacturers
- 5 Tips for Software Monetization in the IoT
- IDC Supporting Software Business Transformation with Systems Designed for the Task
- How to Achieve a Cloud-Connected Experience Using On-Premise Applications
- IDC Meeting Customer and Business Needs in a Changing Market
- NEW! Cloud-Based Software Licensing: Enabling Operational Efficiency, Delighted Customers and Sustainable Competitive Advantage
- NEW! Pricing Model Flexibility as a Competitive Advantage
- NEW! Monetizing IoT - Show me the Money
- NEW! Monetization Strategies and Technologies to Future-proof Your Business