Universiti Utara Malaysia
Shareware programs are susceptible to piracy. Various reverse engineering methods used to circumvent software-based protection that are employed by existing shareware programs were analyzed in this paper to provide insight into their weaknesses. These weaknesses include easily reverse-engineered algorithms, algorithms that compare the valid key with the entered key in plain text in memory, algorithms that reveal the actual key in memory and single point of failure. Because shareware programs are generally inexpensive and are developed by small teams, it may not be practical for shareware developers to implement protection solutions that are prohibitive in terms of cost and effort.