2002
DOI: 10.1007/3-540-47870-1_1
|View full text |Cite
|
Sign up to set email alerts
|

Discouraging Software Piracy Using Software Aging

Abstract: Abstract. Most people consider frequent software updates a nuisance. However, we show how this common phenomenon can be turned into a feature that protects against software piracy. We define a protocol for "drop-in" upgrades of software that renders a large class of software piracy more traceable. A novel feature of our approach is a software aging technique by which we force the updates to occur, or else the software becomes decreasingly useful over time.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2003
2003
2016
2016

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 2 publications
0
14
0
Order By: Relevance
“…Among other available approaches, wbac-resistant cryptographic components can also (and are often recommended to) employ a strategy of regular software updates or replacements (cf. Jakobsson and Reiter [17]). When appropriate, such a design requires that protection need only withstand attacks for a limited period of time -thus counterbalancing the extreme threats faced, and the resulting limits on the level of protection possible.…”
Section: Black-box Gray-box and White-box Attack Contextsmentioning
confidence: 98%
“…Among other available approaches, wbac-resistant cryptographic components can also (and are often recommended to) employ a strategy of regular software updates or replacements (cf. Jakobsson and Reiter [17]). When appropriate, such a design requires that protection need only withstand attacks for a limited period of time -thus counterbalancing the extreme threats faced, and the resulting limits on the level of protection possible.…”
Section: Black-box Gray-box and White-box Attack Contextsmentioning
confidence: 98%
“…The idea is to use the concept of the software aging technique [29]: this forces, at a regular interval, updates to the white-box implementation. It is hoped that when this interval is small enough, this gives insufficient computational time to the adversary to extract the secret key from the white-box implementation.…”
Section: Scientific White-box Cryptography Techniques: An Overviewmentioning
confidence: 99%
“…Another proposal [19] is cycling software (e.g. through some forced obsolescence) at a rate faster than an opponent can break it; this expects the model of forced software renewal (Jakobsson and Reiter [20]), who suggested hopeless pirates via forced updates and software aging). This technique is suitable where protection from attacks for a restricted time period suffices.…”
Section: Literature Surveymentioning
confidence: 99%