The Community for Technology Leaders
Green Image
Issue No. 05 - September/October (2008 vol. 6)
ISSN: 1540-7993
pp: 86-87
Daniel G. Conway , Augustana College
There's reverse engineering to understand, and then there's reverse engineering to copy. Counterfeiting is a very old human temptation, but it is keeping up with the digital world very well indeed. Putting aside ordinary movie piracy, we thought that for this issue we'd just compare some counterfeiting metrics, old and new. Putting the punchline right up front, counterfeiting matters in information technology (IT)—and IT might soon be where counterfeiting matters most.
counterfeit, computer security, Dan Geer, security metrics, Dan Conway, for good measure

D. G. Conway and D. E. Geer Jr., "Type II Reverse Engineering," in IEEE Security & Privacy, vol. 6, no. , pp. 86-87, 2008.
82 ms
(Ver 3.3 (11022016))