The Anti-Piracy Measure Using Encryption of Embedded Products May Mitigate the Security Strength

Abstract

In this paper, firstly we describe the piracy problem of embedded products. Then we formulate the security features of anti-piracy embedded products. Finally we prove that the anti-piracy measure using encryption of embedded products may mitigate the security strength.

Share and Cite:

Xiong, Z. , Zhang, R. , Zhan, X. and Liu, Z. (2013) The Anti-Piracy Measure Using Encryption of Embedded Products May Mitigate the Security Strength. Communications and Network, 5, 430-433. doi: 10.4236/cn.2013.53B2079.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] C. Collberg and J. Nagra, “Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection,” Addison-Wesley Professional, 2009.
[2] H. B. Enderton, “Set Theory—An Introduce to Independence Proofs,” North Holland Publishing Company, 1977.
[3] C. Y. Luo, G. S. Deng and Y. H. Guo, “Copyright Protection Model of Embedded Systems and Its Applications in Digital TV SET-Top-Box,” 2008 International Symposium on Computational Intelligence and Design, Proposed a System Copyright Protection Model Based on Specific Crypto Memory IC, 2008.
[4] Y. Park, “Design and Performance Evalua-tion of Binary Code Packing for Protecting Embedded Software against Reverse Engineering,” 13th IEEE In-ternational Sympo- sium on Object /Component/Service-Oriented Real-Time Distributed Computing, 2010.
[5] Z. Y. Yang, “Software Protection Solutions for Embedded Systems,” Computer Applications and Software, Vol. 26, No. 8, 2009.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.