Issue No. 05 - September/October (2008 vol. 6)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2008.132
Daniel E. Geer Jr. , In-Q-Tel
Daniel G. Conway , Augustana College
There's reverse engineering to understand, and then there's reverse engineering to copy. Counterfeiting is a very old human temptation, but it is keeping up with the digital world very well indeed. Putting aside ordinary movie piracy, we thought that for this issue we'd just compare some counterfeiting metrics, old and new. Putting the punchline right up front, counterfeiting matters in information technology (IT)—and IT might soon be where counterfeiting matters most.
counterfeit, computer security, Dan Geer, security metrics, Dan Conway, for good measure
Daniel E. Geer Jr., Daniel G. Conway, "Type II Reverse Engineering", IEEE Security & Privacy, vol. 6, no. , pp. 86-87, September/October 2008, doi:10.1109/MSP.2008.132