Abstract
Staggering amounts of commercial software are marketed to fulfill needs from the PC explosion. Unfortunately, such software is trivial to duplicate! From the vendors’ viewpoint a way to protect profit is needed. Typically, they have resorted to various schemes that attempt to inhibit the duplication process.
Although protection of future profit is important, so is protection against current loss. Commercial and business related software must be adequately protected lest data be stolen or manipulated. However, more important than any of these classes is protection of government computer resources, especially classified and operational software and data. Loss of control in this realm could be detrimental to national security.
This paper addresses current technologies employed in protection schemes: signatures (magnetic and physical) on floppy disks, Software Analysis Denial (SAD), Hardware Security Devices (HSD), and Technology Denial Concepts (TDC) are presented, with an emphasis on SAD. Advantages and disadvantages of these schemes will be clarified.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This work performed at Sandia National Laboratories, supported by the Department of Energy under contract No. DE-AC04-76DP00789.
8.0 References
S. Armbrust and T. Forgeron, “Entymological Explorations”, PC Tech Journal, vol. 3, no. 1, (Jan. 1985), pp. 88–109.
S. Armbrust and T. Forgeron, “Untangling Problems”, PC Tech Journal, vol. 3, no. 4, (Apr. 1985), pp. 81–95.
COPYIIPC Option Board Manual, Central Point Software, (1985).
D. Daftwyler, “Professional Debugging”, PC Tech Journal, vol. 3, no. 3, (Mar. 1985), pp. 60–73.
Disk Mechanic Technical Manual for the IBM Personal Computer, MLI MICROSYSTEMS, (May 1985).
D. Gabel, “Copy Protection”, PC Week, vol. 2, no. 34, (Aug. 1985), pp. 35–37.
G. Geruaise Davis III, Esq., Software Protection: Practical and Legal Steps to Protect and Market Computer Programs, Van Nostrand Reinhold, New York, (1985).
HP 64000 Logic Development System Model 64620A Logic State/Software Analyzer Reference Manual, P/N 64620-90903, Colorado Springs, HEWLETT-PACKARD, (1982).
IBM Personal Computer Technical Reference Manual, IBM, (Apr. 1983).
I2ICE Integrated Instrumentation and In-Circuit Emulation System Reference Manual, P/N 163252-003, INTEL, (1984).
ISBC 204 Flexible Diskette Controller Hardware Reference Manual, P/N 9800568-02, INTEL, (1979).
B. Landreth and H. Rheingold, Out of the Inner Circle: A Hacker’s Guide to Computer Security, Microsoft Press, Bellevue, Washington, (1985).
S. Levy, Hackers Heroes of the Computer Revolution, Anchor Press/Doubleday, Garden City, New York, (1984).
Microsystem Components Handbook: Microprocessors and Peripherals, vol. 1&2, P/N 230843-002, INTEL, (1985).
S. Morse, The 8086/8088 Primer: An Introduction to their Architecture, System Design, and Programming, Hayden, Rochelle Park, New Jersey, (1982).
D. Parker, Fighting Computer Crime, Charles Scribner’s Sons, New York, (1983).
W. Rosch, “Internal Security”, PC Week, vol. 2, no. 18, (May 1985), pp. 89–108.
Shugart OEM Manual: SA 810/860 Single/Double-Sides Half-Height Diskette Storage Drives, (1982).
G. Simmons, “How to (Selectively) Broadcast a Secret”, Proceedings of the Symposium on Security and Privacy, Oakland, California, (Apr. 22–24, 1985), pp. 108–113.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1986 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gosler, J.R. (1986). Software Protection: Myth or Reality?. In: Williams, H.C. (eds) Advances in Cryptology — CRYPTO ’85 Proceedings. CRYPTO 1985. Lecture Notes in Computer Science, vol 218. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39799-X_13
Download citation
DOI: https://doi.org/10.1007/3-540-39799-X_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-16463-0
Online ISBN: 978-3-540-39799-1
eBook Packages: Springer Book Archive