Vanity, cracks and malware: insights into the anti-copy protection ecosystem

@article{Kammerstetter2012VanityCA,
  title={Vanity, cracks and malware: insights into the anti-copy protection ecosystem},
  author={Markus Kammerstetter and Christian Platzer and Gilbert Wondracek},
  journal={Proceedings of the 2012 ACM conference on Computer and communications security},
  year={2012}
}
Today, a large amount of software products include mechanisms to counter software piracy. However, most protection mechanisms can be easily circumvented by applying software patches (cracks) or license key generators (keygens) with seemingly no financial incentives. Our research shows that the distribution of cracks and keygens not only allows miscreants to generate revenue (e.g. through advertising or malware infections), but it also leads to high risks for the end-users of pirated software… Expand
Overcoming Trial Version Software Cracking Using a Hybridized Self-Modifying Technique
TLDR
The result shows that the hybridized self-modifying technique proposed is able to block hackers and thus prevent code cracking and combines obfuscation and hashing mechanisms to resist attackers from cracking software. Expand
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software
TLDR
It is found that unwanted ad injectors, browser settings hijackers, and “cleanup” utilities dominate the software families buying installs in the ecosystem of commercial pay-per-install and the role it plays in the proliferation of unwanted software. Expand
Source Code Obfuscation : A Technique for Checkmating Software Reverse Engineering
With the widespread use of personal computers and advent of the Internet technology, computer security has suffered a lot of setbacks. Computer users especially hackers these days are finding ways toExpand
An empirical study of global malware encounters
TLDR
It is found that trojans, worms, and viruses are most prevalent in Sub-Saharan African countries, and the main factor that explains high malware exposure of these countries is a widespread computer piracy especially when combined with poverty. Expand
Malware in Pirated Software: Case Study of Malware Encounters in Personal Computers
TLDR
The results show that 63% of the samples procured for the case study showed presence of malware and the incidence of malware varies with the geographical location where the sample was procured, and the results indicate that Trojans and Hacktools are the most prevalent families of malware in samples. Expand
Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web
TLDR
This framework can obtain long-term data on how many hosts users are forced to access by the access of a web page, so it is believed that the framework can distinguish legitimate changes in web pages with compromised changes. Expand
An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors
TLDR
A framework that aims to detect and prevent drive-by download with users' voluntary monitoring of the web based on the characteristics of web page transition behaviors caused by malicious websites that force users to download malicious software is implemented. Expand
Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting
TLDR
The data shows that current anti-piracy efforts are visible, but their overall impact appears to be rather limited, and suggests that future antipiracy measures that are currently under discussion may not be as successful as their proponents might expect. Expand
Security Risk Management in IT Small and Medium Enterprises
Data breaches, security incidents and the threat landscape has been widely researched and documented. Different defence measures and policies, their effects and implications have also been researchedExpand
An Expert System for Automatic Software Protection
TLDR
An expert system for automating the protection of applications is presented, believed to be the first application of the expert system paradigm to this challenging problem, based on the formalization of the mental decision processes and background knowledge of software security experts involved in the ASPIRE project. Expand
...
1
2
...

References

SHOWING 1-10 OF 32 REFERENCES
Measuring Pay-per-Install: The Commoditization of Malware Distribution
TLDR
It is found that of the world's top 20 most prevalent families of malware, 12 employ PPI services to buy infections, and the duration of malware distribution is analyzed. Expand
TTAnalyze: A Tool for Analyzing Malware
TLDR
TTAnalyze is presented, a tool for dynamically analyzing the behavior of Windows executables, which runs binaries in an unmodified Windows environment, which leads to excellent emulation accuracy and makes it more difficult to detect by malicious code. Expand
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
TLDR
The Monkey-Spider project is introduced, utilizing it as a client honeypot, and the challenge in such an approach is portrayed and the system is evaluated as a high-speed, Internetscale analysis tool to build a database of threats found in the wild. Expand
A Crawler-based Study of Spyware in the Web
TLDR
This paper performs a large-scale, longitudinal study of the Web, sampling both executables and conventional Web pages for malicious objects, and quantifies the density of spyware, the types of of threats, and the most dangerous Web zones in which spyware is likely to be encountered. Expand
Software Piracy Exposed
Description: This book is about software piracy-what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are seriousExpand
Revisiting Software Protection
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography. We review the early literatureExpand
International Software Piracy: Analysis of Key Issues and Impacts
TLDR
A general model of ethical behavior related to the impact of behavioral and cultural factors on software piracy is presented to examine whether these determinants of piracy behavior are supranational and transcend cultural and ethical barriers. Expand
Is content publishing in BitTorrent altruistic or profit-driven?
TLDR
This study identifies the content publishers of more than 55K torrents in two major BitTorrent portals and examines their behavior, demonstrating that a small fraction of publishers is responsible for 67% of the published content and 75%" of the downloads. Expand
Warez Trading and Criminal Copyright Infringement
Warez traders have been blamed as a significant cause of copyright piracy, which has led to several dozen conviction of warez traders in the past two years. The article analyzes how criminalExpand
Factors motivating software piracy: a longitudinal study
TLDR
Findings show that social factors and beliefs concerning consequences of software piracy have significant effects on software piracy intentions, and that while habits and facilitating conditions were significantly related to actual piracy behavior, intentions did not necessarily lead to the actual act ofSoftware piracy. Expand
...
1
2
3
4
...