Software Protection: Myth or Reality?

  • Authors:
  • James R. Gosler

  • Affiliations:
  • -

  • Venue:
  • CRYPTO '85 Advances in Cryptology
  • Year:
  • 1985

Quantified Score

Hi-index 0.00

Visualization

Abstract

Staggering amounts of commercial software are marketed to fulfill needs from the PC explosion. Unfortunately, such software is trivial to duplicate! From the vendors' viewpoint a way to protect profit is needed. Typically, they have resorted to various schemes that attempt to inhibit the duplication process.Although protection of future profit is important, so is protection against current loss. Commercial and business related software must be adequately protected lest data be stolen or manipulated. However, more important than any of these classes is protection of government computer resources, especially classified and operational software and data. Loss of control in this realm could be detrimental to national security.This paper addresses current technologies employed in protection schemes: signatures (magnetic and physical) on floppy disks, Software Analysis Denial (SAD), Hardware security Devices (HSD), and Technology Denial Concepts (TDC) are presented, with an emphasis on SAD. Advantages and disadvantages of these schemes will be clarified.