A method of protection based on the use of smart cards and cryptographic techniques
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Towards a theory of software protection and simulation by oblivious RAMs
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
ACM Transactions on Computer Systems (TOCS)
KnowRight '95 Proceedings of the conference on Intellectual property rights and new technologies
Communications of the ACM
Software watermarking: models and dynamic embeddings
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A performance comparison of Java cards for micropayment implementation
Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications
Protecting Mobile Web-Commerce Agents with Smartcards
ASAMA '99 Proceedings of the First International Symposium on Agent Systems and Applications Third International Symposium on Mobile Agents
PROTECTING EXTERNALLY SUPPLIED SOFTWARE IN SMALL COMPUTERS
PROTECTING EXTERNALLY SUPPLIED SOFTWARE IN SMALL COMPUTERS
Software license management with smart cards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
XML-Based Distributed Access Control System
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Secure Content Distribution for Digital Libraries
ICADL '02 Proceedings of the 5th International Conference on Asian Digital Libraries: Digital Libraries: People, Knowledge, and Technology
Hi-index | 0.00 |
Software piracy has been considered one of the biggest problems of this industry since computers became popular. Solutions for this problem based in tamperproof hardware tokens have been introduced in the literature. All these solutions depend on two premises: (a) the physical security of the tamperproof device and (b) the difficulty to analyze and modify the software in order to bypass the check of the presence of the token. The experience demonstrates that the first premise is reasonable (and inevitable). The second one, however, is not realistic because the analysis of the executable code is always possible. Moreover, the techniques used to obstruct the analysis are not helpful to discourage an attacker with usual resources. This paper presents a robust software protection scheme based in the use of smart cards and cryptographic techniques. The security of this new scheme is only dependent on the first premise because code analysis and modification are not useful to bread this scheme.