Multiple "guards" foil hackers.

PositionSoftware

Hackers who try to use or copy software illegally may soon find a sticky web waiting to trap them. It's not the World Wide Web. Instead, it's a new approach under development at Purdue University, West Lafayette, Ind., designed to protect software. By placing a linked brigade of hundreds of tiny "guards" at different points within software code, computer scientists have made it far more difficult for hackers to use software without permission from the vendor.

"Merely cracking a single password won't do it anymore," explains Mikhail Atallah, professor of computer science. "We are distributing security measures throughout the software. It is no longer enough to hack past one point; the guards will notice what you've done and prevent you from using the program. ... We are encouraged by our test results so far. We have been able to add custom levels of security to software without significantly decreasing its speed or increasing the time it takes to download over the Internet."

Traditional software protection measures typically demand that a user enter a password supplied by the vendor at the time of purchase. However, it has proven all too easy for hackers to get past a single security checkpoint, after which they can use a program for free and copy it as often as they wish. "The old way is a lot like having a single guard at the bank," Atallah points out. "Neutralize him, and the vault is yours."

The innovation of...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT