Abstract
Most people consider frequent software updates a nuisance. However, we show how this common phenomenon can be turned into a feature that protects against software piracy. We define a protocol for “drop-in” upgrades of software that renders a large class of software piracy more traceable. A novel feature of our approach is a software aging technique by which we force the updates to occur, or else the software becomes decreasingly useful over time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
E. Adar and B. A. Huberman. Free riding on Gnutella. First Monday, October 2000. http://www.firstmonday.dk/issues/issue5_10/adar/index.html..
N. Asokan, V. Shoup, and M. Waidner. Optimistic protocols for fair exchange. In Proc. ACM Conference on Computer and Communications Security, pages 6–17 1996.
The Business Software Alliance. www.bsa.org.
McAfee Secure Cast / Active Shield. www.McAfee.com.
Microsoft Clip Art Gallery Live. cgl.microsoft.com/clipgallerylive.
NBS FIPS Pub 46-1. Data Encryption Standard, U. S. Department of Commerce, 1988.
Sheriff Software Development Kit. www.sheriff-software.com.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jakobsson, M., Reiter, M.K. (2002). Discouraging Software Piracy Using Software Aging. In: Sander, T. (eds) Security and Privacy in Digital Rights Management. DRM 2001. Lecture Notes in Computer Science, vol 2320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47870-1_1
Download citation
DOI: https://doi.org/10.1007/3-540-47870-1_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43677-5
Online ISBN: 978-3-540-47870-6
eBook Packages: Springer Book Archive