Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry’s Crypt
This talk illustrates the everyday challenges met by embedded security practitioners by five real examples. All the examples were actually encountered while designing, developing or evaluating commercial products.
This note, which is not a refereed research paper, presents the details of one of these five examples. It is intended to help the audience follow that part of our presentation.
- 1.Burger, J., Brill, D., Machi, F.: Self-reproducing programs. Byte 5, 74–75 (August 1980)Google Scholar
- 2.Hofstadter, D.: Godel, Escher, and Bach: An eternal golden braid, pp. 498–504. Basic Books, Inc., New YorkGoogle Scholar
- 3.Motorola Inc., 68HC(7)05H12 General release specifications, HC05H12GRS/D Rev. 1.0 (November 1998)Google Scholar
- 4.Zeller, T.: The ghost in the CD; Sony BMG stirs a debate over software used to guard content, The New York Times, C1 (November 14, 2005)Google Scholar