Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry’s Crypt

  • Vanessa Gratzer
  • David Naccache
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4004)


This talk illustrates the everyday challenges met by embedded security practitioners by five real examples. All the examples were actually encountered while designing, developing or evaluating commercial products.

This note, which is not a refereed research paper, presents the details of one of these five examples. It is intended to help the audience follow that part of our presentation.


  1. 1.
    Burger, J., Brill, D., Machi, F.: Self-reproducing programs. Byte 5, 74–75 (August 1980)Google Scholar
  2. 2.
    Hofstadter, D.: Godel, Escher, and Bach: An eternal golden braid, pp. 498–504. Basic Books, Inc., New YorkGoogle Scholar
  3. 3.
    Motorola Inc., 68HC(7)05H12 General release specifications, HC05H12GRS/D Rev. 1.0 (November 1998)Google Scholar
  4. 4.
    Zeller, T.: The ghost in the CD; Sony BMG stirs a debate over software used to guard content, The New York Times, C1 (November 14, 2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Vanessa Gratzer
    • 1
  • David Naccache
    • 1
    • 2
  1. 1.Université Paris ii Panthéon-Assas, Hall GoullencourtParisFrance
  2. 2.École Normale Supérieure, Équipe de CryptographieParisFrance

Personalised recommendations