Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
ABYSS: An Architecture for Software Protection
White S., Comerford L. IEEE Transactions on Software Engineering16 (6):619-629,1990.Type:Article
Date Reviewed: Feb 1 1991

Because microcomputers’ usefulness depends on the programs written for them and programmers’ motivation depends on protection of their proprietary interests, software protection is very important. Legal protection such as copyright may suffice for some media, but sad experience has shown that it may afford inadequate protection for microcomputer software.

Many physical schemes for protecting such software have been devised but, as the authors make clear, none of them is secure in the presence of normally available means for reproducing the contents of media on which programs are distributed. The authors’ solution involves a second processor. In A Basic Yorktown Security System (ABYSS), a microcomputer contains a protected processor in which critical segments of each protected program run in a way that cannot be observed from outside. There is much more to the architecture, involving cryptographic protocols that permit backup, relocation, and restrictions on the use of software, but the protected processor is the heart of the scheme.

The paper is well written and covers all technical aspects of the subject thoroughly, aptly, and understandably. Whether the authors’ invention is worth implementing depends on the circumstances. The decision is not a simple matter of pricing a processor, but also involves details of the processor such as what its architecture should be and how it should be attached and packaged; the programming needed for supervisory functions; and the cost of designing and developing protected segments of programs.

Reviewer:  S. A. Kurzban Review #: CR123866
Bookmark and Share
Would you recommend this review?
yes
no
Other reviews under "Cryptographic Controls": Date
An asynchronous protocol for distributed computation of RSA inverses and its applications
Cachin C.  Principles of distributed computing (Proceedings of the twenty-second annual symposium, Boston, Massachusetts, Jul 13-16, 2003)153-162, 2003. Type: Proceedings
Mar 4 2004
Cryptographic and information security approaches for images and videos
Ramakrishnan S., CRC Press, Inc., Boca Raton, FL, 2019.  986, Type: Book (978-1-138563-84-1)
Nov 26 2019
Strong loss tolerance of electronic coin systems
Pfitzmann B., Waidner M. ACM Transactions on Computer Systems 15(2): 194-213, 1997. Type: Article
May 1 1998
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 2004 Reviews.com™
Terms of Use
| Privacy Policy