Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry’s Crypt

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4004)


This talk illustrates the everyday challenges met by embedded security practitioners by five real examples. All the examples were actually encountered while designing, developing or evaluating commercial products.

This note, which is not a refereed research paper, presents the details of one of these five examples. It is intended to help the audience follow that part of our presentation.


Memory Cell Alien Species Smart Card Security Practitioner Everyday Challenge 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Burger, J., Brill, D., Machi, F.: Self-reproducing programs. Byte 5, 74–75 (August 1980)Google Scholar
  2. 2.
    Hofstadter, D.: Godel, Escher, and Bach: An eternal golden braid, pp. 498–504. Basic Books, Inc., New YorkGoogle Scholar
  3. 3.
    Motorola Inc., 68HC(7)05H12 General release specifications, HC05H12GRS/D Rev. 1.0 (November 1998)Google Scholar
  4. 4.
    Zeller, T.: The ghost in the CD; Sony BMG stirs a debate over software used to guard content, The New York Times, C1 (November 14, 2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  1. 1.Université Paris ii Panthéon-Assas, Hall GoullencourtParisFrance
  2. 2.École Normale Supérieure, Équipe de CryptographieParisFrance

Personalised recommendations