Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9953))

Included in the following conference series:

Abstract

This paper provides an informal discussion of the formal aspects of software doping.

This work is partly supported by the ERC Grants 683300 (OSARES) and 695614 (POWVER), by the Sino-German CDZ project 1023 (CAP), by ANPCyT PICT-2012-1823, by SeCyT-UNC 05/BP12 and 05/B497, and by the Madrid Region project S2013/ICE-2731 N-GREENS Software-CM.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Apple apologizes and updates iOS to restore iPhones disabled by error 53. https://techcrunch.com/2016/02/18/apple-apologizes-and-updates-ios-to-restore-iphones-disabled-by-error-53/. Accessed 07 July 2016

  2. BionX tuning. http://www.ebiketuning.com/comparison/bionx-tuning.html. Accessed 07 July 2016

  3. Dell laptops reject third-party batteries and AC adapters/chargers. Hardware vendor lock-in? https://nctritech.wordpress.com/2010/01/26/dell-laptops-reject-third-party-batteries-and-ac-adapterschargers-hardware-vendor-lock-in/. Accessed 07 July 2016

  4. Epson firmware update = no to compatibles. http://www.wasteink.co.uk/epson-firmware-update-compatible-problem/. Accessed 07 July 2016

  5. ‘Error 53’ fury mounts as Apple software update threatens to kill your iPhone 6. https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair. Accessed 07 July 2016

  6. The exhaust emissions scandal (“Dieselgate"). https://events.ccc.de/congress/2015/Fahrplan/events/7331.html. Accessed 07 July 2016

  7. Galaxy S4 on steroids: Samsung caught doping in benchmarks. http://forums.appleinsider.com/discussion/158782/galaxy-s-4-on-steroids-samsung-caught-doping-in-benchmarks. Accessed 07 July 2016

  8. Has a printer update rendered your cartridges redundant? https://conversation.which.co.uk/technology/printer-software-update-third-party-printer-ink/. Accessed 07 July 2016

  9. How it works: The basics of ECU tuning. https://rideapart.com/articles/hows-work-ecu-tuning. Accessed 07 July 2016

  10. How to get access to your bionx console code menu (codelist included). http://electricbikereview.com/community/threads/how-to-get-access-to-your-bionx-console-code-menu-codelist-included.519/. Accessed 07 July 2016

  11. The secret printer companies are keeping from you. http://uk.pcmag.com/printers/60628/opinion/the-secret-printer-companies-are-keeping-from-you. Accessed 07 July 2016

  12. Take that, stupid printer! http://www.slate.com/articles/technology/technology/2008/08/take_that_stupid_printer.html. Accessed 07 July 2016

  13. Arthur, W.B.: Competing technologies, increasing returns, and lock-in by historical events. Econ. J. 99(394), 116–131 (1989). http://www.jstor.org/stable/2234208

    Article  Google Scholar 

  14. Chaudhuri, S., Gulwani, S., Lublinerman, R.: Continuity analysis of programs. In: Hermenegildo, M.V., Palsberg, J. (eds.) Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2010, pp. 57–70 (2010)

    Google Scholar 

  15. Clarkson, M.R., Schneider, F.B.: Hyperproperties. In: Proceedings of CSF 2008. pp. 51–65 (2008)

    Google Scholar 

  16. Goguen, J.A., Meseguer, J.: Security policies and security models. In: 1982 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 26–28 April 1982, pp. 11–20. IEEE Computer Society (1982). http://dx.doi.org/10.1109/SP.1982.10014

  17. Schneier, B., Fredrikson, M., Kohno, T., Ristenpart, T.: Surreptitiously weakening cryptographic systems. Cryptology ePrint Archive, Report 2015/097 (2015). http://eprint.iacr.org/2015/097

  18. Volpano, D.M., Irvine, C.E., Smith, G.: A sound type system for secure flow analysis. J. Comput. Secur. 4(2/3), 167–188 (1996). http://dx.doi.org/10.3233/JCS-1996-42-304

    Article  Google Scholar 

  19. Wikipedia: Chip tuning –Wikipedia, the free encyclopedia (2016). https://en.wikipedia.org/wiki/Chip_tuning. Accessed 07 July 2016

  20. Wikipedia: Volkswagen emissions scandal – Wikipedia, the free encyclopedia (2016). https://en.wikipedia.org/wiki/Volkswagen_emissions_scandal. Accessed 07 July 2016

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pedro R. D’Argenio .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Barthe, G., D’Argenio, P.R., Finkbeiner, B., Hermanns, H. (2016). Facets of Software Doping. In: Margaria, T., Steffen, B. (eds) Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications. ISoLA 2016. Lecture Notes in Computer Science(), vol 9953. Springer, Cham. https://doi.org/10.1007/978-3-319-47169-3_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47169-3_46

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47168-6

  • Online ISBN: 978-3-319-47169-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics