Software Tamper-Proofing Deployed 2-year Anniversary Report

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Compliance and Robustness Rules for Windows Media DRM Implementations Microsoft Corporation.
Software Tamper-Proofing Deployed 2-year Anniversary Report Macrovision Corporation Patrice Capitant VP Engineering.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
INTERNET INFORMATION ACCESS How to avoid and eliminate common problems confronting usage of modern resources to access the Internet.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Lecture 7 Evaluation. Purpose Assessment of the result Against requirements Qualitative Quantitative User trials Etc Assessment of and Reflection on process.
Norman SecureSurf Protect your users when surfing the Internet.
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Introduction to Windows XP Professional Chapter 2 powered by dj.
Windows XP Professional Windows XP Professional Overview Install and Upgrade Windows XP Pro Customize and Manage Windows XP Pro Troubleshoot Common Windows.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
IIS Security Sridurga Mavram. Contents -Introduction -Security Consideration -Creating a web page -Drawbacks -Security Tools -Conclusion -References.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Microsoft Management Seminar Series SMS 2003 Change Management.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Visual Basic for Application - Microsoft Access 2003 Finishing the application.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Kerberos Miha Pihler MVP – Enterprise Security Microsoft Certified Master | Exchange 2010.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
● The most common website platform ● User friendly-easy to edit ● Constantly improving-updates, plugins, themes Why WordPress?
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
An Overview to System Management WorldVistA Community Meeting June 14-17, 2007 Seattle, WA.
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
ArcGIS for Server Security: Advanced
Securing Information Systems
Chapter Objectives In this chapter, you will learn:
Introduction to Operating Systems
Network Security (the Internet Security)
Featured Enhancements to the IDE & Debugger
Common Methods Used to Commit Computer Crimes
Netscape Application Server
Chapter 4: Application Software
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Securing the Network Perimeter with ISA 2004
^ About the.
Business Risks of Insecure Networks
Full Exam Name: Microsoft Dynamics CRM 2016 Online Deployment
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
PSE-Endpoint-Associate Exam Study Questions & PSE-Endpoint-Associate PDF Training Material
Solutions: Backup & Restore
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Microsoft Dumps PDF CompTIA SY0-501 Dumps PDF CompTIA Security+ Certification RealExamCollection.com.
Auditing in SQL Server 2008 DBA-364-M
Continuous Automated Chatbot Testing
Hacking and Securing Laptops
Create Links to STAT!Ref for your Web site
HC Hyper-V Module GUI Portal VPS Templates Web Console
Administering Your Network
Information Security Awareness
Computer Repair & Maintenance
What is Information Security?
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
IS4680 Security Auditing for Compliance
CSC-682 Advanced Computer Security
Designing IIS Security (IIS – Internet Information Service)
Microsoft MB-230 Microsoft Dynamics 365 for Customer Service.
Microsoft Deployment Workshop Deploying Office 2003 Editions
Presentation transcript:

Software Tamper-Proofing Deployed 2-year Anniversary Report Macrovision Corporation Patrice Capitant VP Engineering

Agenda SafeDisc The Hacker World Hacker Tools & Security Risks SafeDisc Deployment In The Field The Lessons Recommendations SafeDisc 2.0 Summary

SafeDisc Copy Protection of PC games on CD. Applied to more than 51 million units over 20 months Applied to more than 300 titles More than 100 SafeDisc replication facilities worldwide

The Hacker World Super-Hackers (The White Knights) Custom Tools Organized (suppliers, crackers, coders, web hosters) Friendly competition but cooperation on tough problems Custom Tools Debuggers & add-ons (anti-debugger aids, memory dumps...) Advanced Hex-editors Packers & unpackers (PEcrypt, Procdump,…)

The Hacker World Hacker’s goals: to beat and humiliate you Generate tamper-proof patches Generate essays on your technology Generate essays on hack techniques

Hackers’ Application Form – Part 1 : .:[ #HUMMERS_WareZ ]:. : .:[ Application Form ]:. §-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+§ WE'RE LOOKING FOR: Suppliers, Web Hosters, Crackers, Coders Check the position(s) you want to apply for, look for the section & answer the questions. : []Topsite FTP Courier X1 : X2 : X9 : : []Web Hoster X1 : X3 : X9 : : []Site Operator X1 : X4 : X9 : : []Shell Supplier X1 : X5 : X9 : : []Supplier X1 : X6 : X9 : : []Cracker X1 : X7 : X9 : : []Coder X1 : X8 : X9 : : []Other X1 : X9 : X9 :

Hackers’ Application Form – Part 2 X1. Information : Real Name-...............................[ ] : Nick-....................................[ ] : E-mail-..................................[ ] : IP Mask-.................................[ ] : ICQ Number-..............................[ ] : Connection speed-........................[ ] : Years of experience in warez?-...........[ ] : Have you been or are you in a group right now? [ ]-YES [ ]-NO : What Groups? What Position? Groups-...............[ ] Position-.............[ ]

Hackers’ Application Form – Part 3 X2. Topsite FTP Courier : Do you have access to new, 0-min warez? [ ]-YES [ ]-NO : How many mb can you curry in a week?-......[ MBS ] : Name the sites you are on? #1-[ ] #2-[ ] #3-[ ]

Hackers’ Application Form – Part 4 X3. Web Host : Can you host the page 24/7? []-YES []-NO : Space Available for the page-..............[ MBS ] : Any other information? (Domain name, etc) [ ]

Hackers’ Application Form – Part 5 X4. SiteOp : Connection Speed: (cable users need not apply) []T1 []T3 []OC+ : Operating System (Check all that apply) [ ]Windows 3.1x/95/98 [ ] Any Nix os (Please Specify) [ ] [ ]Other(Please Specify) [ ] : Space Available for the group-..........… [ GIGS ] : Will your site be dedicated to HUMMERS only? [ ]-YES [ ] –NO : Will your site be up 24/7? If not,how often? [ ]-YES [ ]-NO Hours up-[ ] : How many users can your site support at a time?-[ ] : What is the ip and login info of your site? (look only account) IP: [ ] LOGIN: [ ] PASS: [ ]

Hackers’ Application Form – Part 6 X5. Shell Supplier : Do you own a shell? [ ]-YES [ ]-NO : How many 24/7 bots do you have on your shell?-[ ]

Hackers’ Application Form – Part 7 X6. Supplier : What can you supply?-................[ ] : How much can u supply in a day/week?-[ ] : Will you supply on demand? [ ]-YES [ ]-NO

Hackers’ Application Form – Part 8 X7. Cracker : How long have you been hacking/cracking?-[ ] : How many applications have you cracked?-[ ] : How many games have you cracked?-[ ] : What are the last last three games/apps you've cracked? #1-[ ] #2-[ ] #3-[ ] : Are you willing to demonstrate your skills to a Senior in HUMMERS? []-YES []-NO

Hackers’ Application Form – Part 9 X8. Coder : What do you use to code? (Programs) [ ] : Do you have examples of your work? : []-YES []-NO (If yes, please include one with this app) : How fast can you start and finish a good program for the group?

Hackers’ Application Form – Part 10 X9. Other : What other thing can you do that is not listed? [ ] [ ]

Hackers’ Application Form – Part 11 X10. Hand-in App Now rename this yournick.txt and copy and paste, then send it to "HUMMERS@HOME.COM" with "HUMMERS APPLICANT" as your subject. §-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-§ ©1998 [HUMMERS_Warez]

Hacker Tools & Security Risks Debuggers Disassemblers File Level Attacks Memory Lifts Spoofing Cryptographic Attacks Procedural

Debuggers Step through code Set memory and code breakpoints Disassemble code Change operation of code General experimentation tool e.g. SoftIce, TRW and Microsoft debuggers

Disassemblers Can analyse security code in a file on hard drive Allow authentication and security code to be easily patched and recompiled Help remove obfuscation code e.g. idapro

Spoofing Spy programs used to monitor application calls to system functions Spoof program intercepts calls and returns data expected for an authentication e.g. frogsice, spy32

Memory Lifts Copies decrypted application (or sections) from memory to a file. Reconstructs the remainder of the application Can memory lift security code or protected application e.g. procdump

Cryptographic Attacks Use of cryptographic techniques to analyse encrypted-protected applications Use of cryptographic techniques to find decryption keys

Procedural Leaks from publishers Release of demo builds Publishing cracks on the WWW Publishing cracker tools

SafeDisc Deployment Successful Pre-release Testing… …Conclusions: Software successfully tested by single hackers and corporate entities (Microsoft, Alladin) over 2-month period …Conclusions: It will take a very long time to crack: There is plenty of time to add security features If a crack occurs, patching the security hole will be sufficient

In The Field First hack after 6 month. Three generic hacks over two years, all patched. All hacks limited to Super-Hackers. Time to Hack keeps decreasing.

The Lessons Super-Hackers can’t spell Super-Hackers will work together: You are facing large skilled groups not individuals Hacks are more than one break: Frequently reflect systematic understanding of whole security system

The Lessons Hacks are more a matter of “when” than “if” Essays on your security techniques will be published Patches will be tamper-proofed (just to show you)

The Lessons (cont.) Security hardness when raised to the level of Super-Hackers Diminishes number of hacks Diminishes distribution sites for patches Deters cautious users from applying patches

Recommendations Be proactive: Be patient: Focus on slowing down hacks: New security techniques must be added frequently Expect to develop major changes in security architecture on a regular basis Be patient: Monitor hackers techniques & tools Devise multiple techniques before releasing counter-attack Focus on slowing down hacks: Put as many layers of security as you can in all critical areas Focus on limiting hack effectiveness: Use polymorphism: Each installation is different Dedicate resources to monitor and close Web sites

SafeDisc 2.0 Enhanced automated wrapping tool Added DLL and data protection Additional security layers in each critical area Debuggers, disassemblers, spoofing, memory lifts & cryptographic attacks Heavier use of polymorphism Same program against hackers sites New SDK for publishers Additional security (level 1-3) for identified functions Additional media signatures for both data & audio

Summary SafeDisc hacks limited to a small group of Super-Hackers Original strategy focused on preventing all hacks Did not put a boundary on time to hack Second generation tamper-proofing just released Focuses on limiting time to hack

Conclusion The more you learn, The more you learn you have to learn