DocumentCode :
883084
Title :
Type II Reverse Engineering [For Good Measure]
Author :
Geer, Daneil E., Jr. ; Conway, Daniel G.
Author_Institution :
In-Q-Tel
Volume :
6
Issue :
5
fYear :
2008
Firstpage :
86
Lastpage :
87
Abstract :
There´s reverse engineering to understand, and then there´s reverse engineering to copy. Counterfeiting is a very old human temptation, but it is keeping up with the digital world very well indeed. Putting aside ordinary movie piracy, we thought that for this issue we´d just compare some counterfeiting metrics, old and new. Putting the punchline right up front, counterfeiting matters in information technology (IT)—and IT might soon be where counterfeiting matters most.
Keywords :
Computer architecture; Computer crime; Counterfeiting; Educational institutions; Information security; Lamps; Lighting control; Peer to peer computing; Reverse engineering; Telecommunication traffic; Dan Conway; Dan Geer; computer security; counterfeit; for good measure; security metrics;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2008.132
Filename :
4639033
Link To Document :
بازگشت