• Title/Summary/Keyword: Software Copyright

Search Result 103, Processing Time 0.025 seconds

A Study on Open Source Software License Set-up for Securing Software Copyright (소프트웨어 저작권 확보를 위한 공개소프트웨어 라이선스 설정방안에 관한 연구)

  • Park, Jun-Seok;Kim, Soo-Hong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1437-1440
    • /
    • 2012
  • 최근 사회적 이슈로 부각되고 있는 클라우드 컴퓨팅, 빅데이터 시스템 등은 대부분 공개소프트웨어를 활용하여 개발이 진행되고 있으며, 이에 따라 공개소프트웨어의 활용이 급격히 증가하고 있는 추세이다. 그러나 저비용, 고효율성의 장점을 가진 공개소프트웨어의 성공적인 활용을 위해서는 공개소프트웨어 라이선스를 체계적으로 관리하고, 제품출시 이전에 라이선스 위반 여부를 명확히 확인하여야 향후 법정 분쟁으로부터 자유로울 수 있다는 이슈를 가지고 있다. 본 논문에서는 공개소프트웨어 라이선스에 대한 명확한 이해를 통해 안전한 공개소프트웨어 활용을 위한 공개소프트웨어 라이선스 설정방안을 제시하고자 한다.

How to Prevent Software crack for Control PE (PE Format 조작을 통한 소프트웨어 크랙 방지 기술)

  • Kim, Tae-hyoung;Jang, Jong-uk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.249-251
    • /
    • 2017
  • In the past, People thought that software security was not important. but Skills of attacking software has growing up in fast, software crack fall down software industry growth and profit of copyright holder was declined. So I propose software crack prevention for changing PE Format. Hackers can analyze program in static. As we change the PE format, we can prevent static analysis. As I insert anti - debugging code the exe file, the program is protected from dynamic analysis.

  • PDF

Realization of Package Software Inspection Service for Software Asset Management (소프트웨어 자산관리를 위한 패키지소프트웨어 점검서비스 구현)

  • Cha, Tea-Won;Ahn, Jae-Kyoung
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.123-132
    • /
    • 2009
  • Even support-and-management efforts by government are enforced with the growing international restrictions for complying with global standard, not a few private enterprises are still suffering software management problems from lack of understanding the software asset management and carelessness of the software management. This is due to the ambiguous scope of software asset management as well as characteristics of software property such as invisibility, easiness of copy and installation. In other words, it is not easy for software managers to comply all the information throughout the software life cycle; from purchasing, procurement. distribution, preservation to disposition. Therefore, Inspector which has been developed for resolving these problems are proposed in this study. The inspection service consists of search algorithms adapted for software characteristics, standardization of software right management information, and practical use of registry information. Inspection time for a PC by using inspector make the inspection time much shorter. It is also shown that effective software management enables the enterprise to curtail software acquisition cost and to help rationalizing its business management.

Study on Procedure for Escrow Account to Resolve Controversy of Intellectual Property Right of Software for Rolling Stock (철도차량 Software 지적 재산권 분쟁 해결을 위한 Escrow Account 적용 절차에 대한 연구)

  • Park, Jun-Hyung;Cho, Chi-Hwan;Kang, Chan-Yong
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1479-1485
    • /
    • 2008
  • This paper shows the result of study on the detailed applicable procedure of software Escrow account applied for rolling stock. The customer as end-user requires software source code, related critical technical documents etc. about software based system of train for maintenance purpose through software modification and enhancement after completion of warranty period. Otherwise, it is not easy to keep up with the customer's requirement of demanding supplier's exclusive information because it is considered as intellectual property rights of supplier as software developer. Therefore, the main contractor(normally called as Car-builder) need to introduce software Escrow service in order to coordinate the different a standpoint between software developer and end-user. Software Escrow is a legal arrangement in which an software Escrow packages (software source code, software development tool, build process, proprietary information, copyright and etc.) is deposited into and Escrow account under the trust of a reliable third party (Escrow agent) depending on mutual agreement on Escrow contract condition as signing off Escrow agreement document. This paper deals with the study on the detailed procedure about the following general category of Escrow procedure and purpose to apply this specific procedure of Escrow into the future project onward.

  • PDF

Classifying Windows Executables using API-based Information and Machine Learning (API 정보와 기계학습을 통한 윈도우 실행파일 분류)

  • Cho, DaeHee;Lim, Kyeonghwan;Cho, Seong-je;Han, Sangchul;Hwang, Young-sup
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1325-1333
    • /
    • 2016
  • Software classification has several applications such as copyright infringement detection, malware classification, and software automatic categorization in software repositories. It can be also employed by software filtering systems to prevent the transmission of illegal software. If illegal software is identified by measuring software similarity in software filtering systems, the average number of comparisons can be reduced by shrinking the search space. In this study, we focused on the classification of Windows executables using API call information and machine learning. We evaluated the classification performance of machine learning-based classifier according to the refinement method for API information and machine learning algorithm. The results showed that the classification success rate of SVM (Support Vector Machine) with PolyKernel was higher than other algorithms. Since the API call information can be extracted from binary executables and machine learning-based classifier can identify tampered executables, API call information and machine learning-based software classifiers are suitable for software filtering systems.

The Study of Similarity Measure on O-Line Game Software (온라인 게임 소프트웨어 복제도 산출기법에 관한 연구)

  • Kim, Jin-Yong;Kim, Jin-Uk
    • Journal of Korea Game Society
    • /
    • v.4 no.1
    • /
    • pp.50-57
    • /
    • 2004
  • The copyright against the game which is successful to a performance, is increasing rapidly. The compute r game is sensitive to a popularity. Game from the hazard which it develops short time, the expense which is cheap, about lower the dispute with a copyright, a reproduction and the ticket paragraph increases with the insufficient back of technical power. It analyzes the quality of the tools comparison it will be able to analyze the source codes from the dissertation which it sees. It analyzed the game source code and against the method which produces the original program and the reproduction degree of reproduction program for it researched. The method which produces a reproduction degree game feature following function shares a module especially. After from each module separating a file in file structure, source pro gram and data structure form, it calculates a similarity measure. It followed in important degree of each function and weight it let and the fixed quantity reproduction degree of full game program it produced.

  • PDF

Design and Implementation of Tor Traffic Collection System Using Multiple Virtual Machines (다수의 가상머신을 이용한 토르 트래픽 수집 시스템 설계 및 구현)

  • Choi, Hyun-Jae;Kim, Hyun-Soo;Shin, Dong-Myung
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.1-9
    • /
    • 2019
  • We intend to collect and analyze traffic efficiently in order to detect copyright infringement that illegally share contents on Tor network. We have designed and implemented a Tor traffic collection system using multiple virtual machines. We use a number of virtual machines and Mini PCs as clients to connect to Tor network, and automate both the collection and refinement processes in the traffic collection server through script-based test client software. Through this system, only the necessary field data on Tor network can be stored in the database, and only 95% or more of recognition of Tor traffic is achieved.

A Code Concealment Method using Java Reflection and Dynamic Loading in Android (안드로이드 환경에서 자바 리플렉션과 동적 로딩을 이용한 코드 은닉법)

  • Kim, Jiyun;Go, Namhyeon;Park, Yongsu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.17-30
    • /
    • 2015
  • Unlike existing widely used bytecode-centric Android application code obfuscation methodology, our scheme in this paper makes encrypted file i.e. DEX file self-extracted arbitrary Android application. And then suggests a method regarding making the loader app to execute encrypted file's code after saving the file in arbitrary folder. Encrypted DEX file in the loader app includes original code and some of Manifest information to conceal event treatment information. Loader app's Manifest has original app's Manifest information except included information at encrypted DEX. Using our scheme, an attacker can make malicious code including obfuscated code to avoid anti-virus software at first. Secondly, Software developer can make an application with hidden main algorithm to protect copyright using suggestion technology. We implement prototype in Android 4.4.2(Kitkat) and check obfuscation capacity of malicious code at VirusTotal to show effectiveness.

Similarity Evaluation and Analysis of Source Code Materials for SOC System in IoT Devices (사물인터넷 디바이스의 집적회로 목적물과 소스코드의 유사성 분석 및 동일성)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.55-62
    • /
    • 2019
  • The needs for small size and low power consumption of information devices is being implemented with SOC technology that implements the program on a single chip in Internet of Thing. Copyright disputes due to piracy are increasing in semiconductor chips as well, arising from disputes in the chip implementation of the design house and chip implementation by the illegal use of the source code. However, since the final chip implementation is made in the design house, it is difficult to protect the copyright. In this paper, we deal with the analysis method for extracting similarity and the criteria for setting similarity judgment in the dispute of source code written in HDL language. Especially, the chip which is manufactured based on the same specification will be divided into the same configuration and the code type.

A Logo Transition Detection Method for Opaque and Semi-Transparent TV Logo Recognition in Video (비디오에서 불투명 및 반투명 TV 로고 인식을 위한 로고 전이 검출 방법)

  • Roh, Myung-Cheol;Kang, Seung-Yeon;Lee, Seong-Whan
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.12
    • /
    • pp.753-763
    • /
    • 2008
  • The amount of UCCs (User Created Contents) has been increasing rapidly and is associated with a serious copyright problem. Automatic logo detection in videos is an efficient means of overcoming the copyright problem. However, logos have varying characteristics, which make logo detection and recognition very difficult. Especially, there are frequent logo transitions in a video, comprising several video contents. This disrupts accurate video segmentation based on logos. Therefore, this paper proposes an accurate logo transition detection method for recognizing logos in digital video contents. The proposed method accurately segments a video according to logo and efficiently recognizes various types of logos. The experimental results demonstrate the effectiveness of the proposed method for logo detection and video segmentation according to logo.