A. Spesivtsev, A.J. Krutjakov, V. Seregin, V. Sidorov, V. Wegner
{"title":"软件复制保护系统:结构、分析、攻击","authors":"A. Spesivtsev, A.J. Krutjakov, V. Seregin, V. Sidorov, V. Wegner","doi":"10.1109/CCST.1992.253738","DOIUrl":null,"url":null,"abstract":"Copy protection systems are a reliable way to protect programmers' rights and to stimulate market development because they prevent unauthorized software use and copying. The main functions and structure of such systems are discussed. Possible attacks and breaking of copy protection systems are considered. One of the strongest systems, called the Iron Curtain, is described. Recommendations for selection of the right copy protection system are given.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"231 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Software copy protection systems: structure, analysis, attacks\",\"authors\":\"A. Spesivtsev, A.J. Krutjakov, V. Seregin, V. Sidorov, V. Wegner\",\"doi\":\"10.1109/CCST.1992.253738\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Copy protection systems are a reliable way to protect programmers' rights and to stimulate market development because they prevent unauthorized software use and copying. The main functions and structure of such systems are discussed. Possible attacks and breaking of copy protection systems are considered. One of the strongest systems, called the Iron Curtain, is described. Recommendations for selection of the right copy protection system are given.<<ETX>>\",\"PeriodicalId\":105477,\"journal\":{\"name\":\"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures\",\"volume\":\"231 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1992-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.1992.253738\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1992.253738","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Copy protection systems are a reliable way to protect programmers' rights and to stimulate market development because they prevent unauthorized software use and copying. The main functions and structure of such systems are discussed. Possible attacks and breaking of copy protection systems are considered. One of the strongest systems, called the Iron Curtain, is described. Recommendations for selection of the right copy protection system are given.<>