1987
DOI: 10.1145/29868.29872
|View full text |Cite
|
Sign up to set email alerts
|

Public protection of software

Abstract: One of the overwhelming problems that software producers must contend with is the unauthorized use and distribution of their products. Copyright laws concerning software are rarely enforced, thereby causing major losses to the software companies. Technical means of protecting software from illegal duplication are required, but the available means are imperfect. We present protocols that enable software protection, without causing substantial overhead in distribution and maintenance. The protocols may be implem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

1990
1990
2013
2013

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(18 citation statements)
references
References 6 publications
0
17
0
Order By: Relevance
“…Herzberg and Pinter [26] describe a device that can be used to protect software against piracy. A more recent approach by Yee and Tygar [27] ensures that the system functions securely.…”
Section: Trusted Execution Environmentsmentioning
confidence: 99%
“…Herzberg and Pinter [26] describe a device that can be used to protect software against piracy. A more recent approach by Yee and Tygar [27] ensures that the system functions securely.…”
Section: Trusted Execution Environmentsmentioning
confidence: 99%
“…One approach taken in academic studies of piracy has been to implicitly adopt the corporate view: focusing on modeling the piracy behavior (Takeyama 1994;Slive and Bernhardt 1998), exploring individual differences (Doesn't Everybody do it? 2001), and proposing technical solutions to reduce the behavior (Herzberg and Pinter 1987;Potlapally 2002;Naumovich and Memon 2003) including the development of pricing strategies that minimize piracy's effect (Sundararajan 2003).…”
Section: The Peculiar Nature Of Computer Software Is Such That It Elumentioning
confidence: 99%
“…Advocates of digital property rights maintain that digital piracy costs billions of dollars in revenues, wages, jobs, and taxes for the U.S.A. alone ( Serafini 2001;AutoDesk 2002;Plagiarism.org;Business Software Alliance 2004). Evidence like this has led some researchers to construe piracy as a problem (Vitell and Davis 1990) and has led to proposed technical solutions to remedy its occurrences (Herzberg and Pinter 1987;Potlapally 2002;Naumovich and Memon 2003). This normative approach is also grounded in the legal argument that it is unacceptable to copy software without authorization because it violates the rights of the software creator who does not sell ownership of the software but merely licenses its use.…”
Section: Introductionmentioning
confidence: 99%
“…Herzberg and Pinter [33] consider the problem of software copy protection, and propose a solution requiring CPU encryption support (which was far less feasible when proposed almost 20 years ago, circa 1984-85). Cohen's 1993 paper [19] (see also §3.4 below) on software diversity and obfuscation is directly related to software protection, and provides a wealth of techniques and insights.…”
Section: Early Research On Software Protectionmentioning
confidence: 99%