tHE mUTABLE
December 12th, 2007, 21:31
Hi,
After I finished reading "Security Strength Measurements for Dongle-Protected Software" article in IEEE Security & Privacy Magazine (November/December 2007), I feel so sorry for those who are involved in this work! Actually, they were trying to devise an original methodology to measure how secure your dongle protected software is, based on a very trivial type of attacks. And not only though, their comparison is referred to how long will it takes you to un-protect this software in terms of time (per minutes) with some... It's absolutely ridiculous and it has nothing to do with software engineering methodologies to measure how secure your software is... does that mean that software is resistant to attack (relatively speaking) if it'll takes me 10 hours to unprotected it .I won't talk about it that much, I hope you have an access to this article...
And by the way they mentioned Crackz website... (of course, do they have another source of knowledge)
After I finished reading "Security Strength Measurements for Dongle-Protected Software" article in IEEE Security & Privacy Magazine (November/December 2007), I feel so sorry for those who are involved in this work! Actually, they were trying to devise an original methodology to measure how secure your dongle protected software is, based on a very trivial type of attacks. And not only though, their comparison is referred to how long will it takes you to un-protect this software in terms of time (per minutes) with some... It's absolutely ridiculous and it has nothing to do with software engineering methodologies to measure how secure your software is... does that mean that software is resistant to attack (relatively speaking) if it'll takes me 10 hours to unprotected it .I won't talk about it that much, I hope you have an access to this article...
And by the way they mentioned Crackz website... (of course, do they have another source of knowledge)