Publication | Closed Access
Security Strength Measurement for Dongle-Protected Software
24
Citations
11
References
2007
Year
Mobile SecurityEngineeringInformation SecuritySecurity StrengthSecurity EvaluationSoftware AnalysisHardware SecurityWireless SecuritySecurity Strength MeasurementHardware Security SolutionNetwork SecurityComputer EngineeringComputer ScienceData SecurityCryptographyCopy ProtectionHypothetical AttackerSecurityTechnology
Many people consider dongles to be among the strongest forms of copy protection, but how much security do they actually offer? The model presented here aims to monetize the security strength of dongle-protected software by forecasting the amount of time a hypothetical attacker would take to break it.
| Year | Citations | |
|---|---|---|
Page 1
Page 1