Proposal / Submission Type
Peer Reviewed Paper
Location
Richmond, Virginia
Start Date
25-5-2011 2:00 PM
Abstract
Piracy is potentially possible at any stage of the lifetime of the software. In a post-piracy situation, however, the growth of the respective versions of the software (both the original and pirated) is expected to be in different directions as a result of expectedly different implementation strategies. This paper shows how such post-piracy modifications are of special interest to a cyber crime expert investigating software piracy and suggests that the present software piracy forensic (or software copyright infringement investigation) approaches require amendments to take in such modifications. For this purpose, the paper also presents a format that is jargon-free, so as to present the findings in a more intelligible form to the judicial authorities.
Keywords: Piracy, post-piracy modifications, software piracy, source code, copyright, software copyright infringement, software piracy forensics, database forensics, MIS forensics, AFC, SCAP, technical expert, substantial similarity test, CDAC
Scholarly Commons Citation
Bhattathiripad, Vinod and Santhosh Baboo, S., "Software Piracy Forensics: Impact and Implications of Post‐Piracy Modifications" (2011). Annual ADFSL Conference on Digital Forensics, Security and Law. 6.
https://commons.erau.edu/adfsl/2011/wednesday/6
Included in
Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, Information Security Commons
Software Piracy Forensics: Impact and Implications of Post‐Piracy Modifications
Richmond, Virginia
Piracy is potentially possible at any stage of the lifetime of the software. In a post-piracy situation, however, the growth of the respective versions of the software (both the original and pirated) is expected to be in different directions as a result of expectedly different implementation strategies. This paper shows how such post-piracy modifications are of special interest to a cyber crime expert investigating software piracy and suggests that the present software piracy forensic (or software copyright infringement investigation) approaches require amendments to take in such modifications. For this purpose, the paper also presents a format that is jargon-free, so as to present the findings in a more intelligible form to the judicial authorities.
Keywords: Piracy, post-piracy modifications, software piracy, source code, copyright, software copyright infringement, software piracy forensics, database forensics, MIS forensics, AFC, SCAP, technical expert, substantial similarity test, CDAC