This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Type II Reverse Engineering
September/October 2008 (vol. 6 no. 5)
pp. 86-87
Daniel G. Conway, Augustana College
There's reverse engineering to understand, and then there's reverse engineering to copy. Counterfeiting is a very old human temptation, but it is keeping up with the digital world very well indeed. Putting aside ordinary movie piracy, we thought that for this issue we'd just compare some counterfeiting metrics, old and new. Putting the punchline right up front, counterfeiting matters in information technology (IT)—and IT might soon be where counterfeiting matters most.
Index Terms:
counterfeit, computer security, Dan Geer, security metrics, Dan Conway, for good measure
Citation:
Daniel E. Geer Jr., Daniel G. Conway, "Type II Reverse Engineering," IEEE Security & Privacy, vol. 6, no. 5, pp. 86-87, Sept.-Oct. 2008, doi:10.1109/MSP.2008.132
Usage of this product signifies your acceptance of the Terms of Use.