THE FUNCTION OF KMS PICO IN THE STRUGGLE TOWARDS APPLICATION COUNTERFEITING