The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - September/October (2008 vol.6)
pp: 86-87
Daniel G. Conway , Augustana College
ABSTRACT
There's reverse engineering to understand, and then there's reverse engineering to copy. Counterfeiting is a very old human temptation, but it is keeping up with the digital world very well indeed. Putting aside ordinary movie piracy, we thought that for this issue we'd just compare some counterfeiting metrics, old and new. Putting the punchline right up front, counterfeiting matters in information technology (IT)—and IT might soon be where counterfeiting matters most.
INDEX TERMS
counterfeit, computer security, Dan Geer, security metrics, Dan Conway, for good measure
CITATION
Daniel E. Geer Jr., Daniel G. Conway, "Type II Reverse Engineering", IEEE Security & Privacy, vol.6, no. 5, pp. 86-87, September/October 2008, doi:10.1109/MSP.2008.132
38 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool