Staggering amounts of commercial software are marketed to fulfill needs from the PC explosion. Unfortunately, such software is trivial to duplicate! From the vendors' viewpoint a way to protect profit is needed. Typically, they have resorted to various schemes that attempt to inhibit the duplication process.Although protection of future profit is important, so is protection against current loss. Commercial and business related software must be adequately protected lest data be stolen or manipulated. However, more important than any of these classes is protection of government computer resources, especially classified and operational software and data. Loss of control in this realm could be detrimental to national security.This paper addresses current technologies employed in protection schemes: signatures (magnetic and physical) on floppy disks, Software Analysis Denial (SAD), Hardware security Devices (HSD), and Technology Denial Concepts (TDC) are presented, with an emphasis on SAD. Advantages and disadvantages of these schemes will be clarified.
[1]
Gustavus J. Simmons,et al.
How to (Selectively) Broadcast A Secret
,
1985,
1985 IEEE Symposium on Security and Privacy.
[2]
Steven Levy,et al.
Hackers: Heroes of the Computer Revolution
,
1984
.
[3]
G. Gervaise Davis,et al.
Software Protection: Practical and Legal Steps to Protect and Market Computer Programs
,
1985
.
[4]
Stephen P. Morse.
The 8086/8088 Primer: An Introduction to Their Architecture, System Design, and Programming
,
1980
.
[5]
Donn B. Parker,et al.
Fighting computer crime
,
1983
.
[6]
Bill Landreth,et al.
Out of the inner circle : a hacker's guide to computer security
,
1985
.