Cloakware Corporation, 260 Hearst Way, Suite 311, Kanata, Ontario, Canada K2L 3H1 Spencer Cheng Trusting DRM Software Presentation.

Slides:



Advertisements
Similar presentations
1 The Project of this year Mariano Ceccato FBK - Fondazione Bruno Kessler
Advertisements

Compliance and Robustness Rules for Windows Media DRM Implementations Microsoft Corporation.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Physical Unclonable Functions and Applications
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
Trusted Design In FPGAs Steve Trimberger Xilinx Research Labs.
Implementing an Untrusted Operating System on Trusted Hardware.
The Mobile Code Paradigm and Its Security Issues Anthony Chan and Michael Lyu September 27, 1999.
H Apr-01 Clark Thomborson Software Security CompSci 725 Handout 28: Report Writing #2 (Sample Titles & Abstracts) Clark Thomborson University of.
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
ROOTKIT VIRUS by Himanshu Mishra Points to be covered Introduction History Uses Classification Installation and Cloaking Detection Removal.
© 2007 Aladdin Knowledge Systems Ltd. All rights reserved. Aladdin, Aladdin Knowledge Systems, the Aladdin Knowledge Systems logo, HASP, HASP SRM, HASP.
INTEGRATING NETWORK CRYPTOGRAPHY INTO THE OPERATING SYSTEM BY ANTHONY GABRIELSON HAIM LEVKOWITZ Mohammed Alali | CS – Dr. RothsteinSummer 2013.
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers Short Position Paper for IEEE POLICY 2009 Carl A. Gunter University.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Security Considerations in Adaptive Middleware Security and Mobile Agents Ajanta – Mobile Agent’s research project papers (
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Seven.
© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release: Case # iOS App Integrity – Got Any? Research Team: Gregg Ganley(PI)
Norman SecureSurf Protect your users when surfing the Internet.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Windows Vista: Volume Activation 2.0
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Discussing “Risk Analysis in Software Design” 1 FEB Joe Combs.
Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators.
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Presented by: Sanketh Beerabbi University of Central Florida.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access.
Wireless and Mobile Security
Digital Rights Management and Trusted Computing Kari Kostiainen T Special Course in Operating System Security April 13 th 2007.
Computer Security By Duncan Hall.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Tamper Resistant Software: An Implementation By David Aucsmith, IAL In Information Hiding Workshop, RJ Anderson (ed), LNCS, 1174, pp , “Integrity.
HardSSH Cryptographic Hardware Key Team May07-20: Steven Schulteis (Cpr E) Joseph Sloan (EE, Cpr E, Com S) Michael Ekstrand (Cpr E) Taylor Schreck (Cpr.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Compilers and Security
CMSC 818J: Privacy enhancing technologies Lecture 2.
Hardware-rooted Trust for Secure Key Management & Transient Trust
LAS16-203: Platform Security Architecture for embedded devices
5/25/2018 2:39 AM © 2006 Microsoft Corporation. All rights reserved.
ABYSS : An Architecture for Software Protection
Attacking an obfuscated cipher by injecting faults
Outline What does the OS protect? Authentication for operating systems
Hardware Cryptographic Coprocessor
Outline What does the OS protect? Authentication for operating systems
CS691 M2009 Semester Project PHILIP HUYNH
CS691 M2009 Semester Project PHILIP HUYNH
User-mode Secret Protection (SP) architecture
Student: Ying Hong Course: Database Security Instructor: Dr. Yang
Faculty of Science IT Department By Raz Dara MA.
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware Kriti shreshtha.
Aimee Coughlin, Greg Cusack, Jack Wampler, Eric Keller, Eric Wustrow
Web Information Systems Engineering (WISE)
Computer Security By: Muhammed Anwar.
Presentation transcript:

Cloakware Corporation, 260 Hearst Way, Suite 311, Kanata, Ontario, Canada K2L 3H1 Spencer Cheng Trusting DRM Software Presentation to W3C Workshop on DRM January 22-23, 2001 Sophia-Antipolis, France

Cloakware Corporation2 Outline The DRM security model Cryptography’s role The need for trusted agents Hardware Solutions Trusted Software Agents Tamper-resistant software Summary

Cloakware Corporation3 DRM Security Model Trusting the Untrustworthy Past and present R&D focused on hostile S/W u Anti-virus S/W & Java sandbox protects users against dangerous S/W and hostile hosts u Trust only occurs with S/W from well known sources DRM users are assumed to be hostile u All you need is one untrusted user/attacker n Attacker have legitimate access to protected content n Attacker have infinite time and resources n Attacker has complete access to S/W and H/W

Cloakware Corporation4 Cryptography is part of the solution Store/stream data in encrypted form to prevent direct access Use a “key” to access content u Where do you store the key? u What if Alice can’t trust Bob with the key? u Who/what checks the integrity checker? u How do you protect the executable? DeCSS and Steven King’s ebook crack were made possible by cryptographic solutions implemented in unprotected software Tamper-resistant S/W complements cryptography in hostile environment n Provides a “Trusted Agent” on client/player to protect decryption key and enforce access control

Cloakware Corporation5 Hardware Solutions Hardware solutions are used for key hiding & tamper resistance Hardware has several drawbacks u Incompatible with installed base of PCs, players u Time and expense to build installed base u Long lifecycle means devices must remain secure for years u Field Upgrades – difficult & costly to replace hardware when it is compromised

Cloakware Corporation6 Trusted Software Agents Reduced manufacturing and distribution costs Compatible with installed base Faster time-to-market Renewable and flexible u Attacks continue to improve/evolve u Replaceable tamper resistant components are essential Easy to manufacture unique agents u Prevents a single crack from compromising a DRM system The Chain of Trust u Content providers may want trusted components on distributors’ servers u Distributors may want trusted components on commerce service providers servers

Cloakware Corporation7 Tamper Resistant Software Tamper resistant libraries & current code obfuscators are inadequate u Offer weak obfuscation and little protection against tampering Portability is key for trusted software agents u Heterogeneous environments are here to stay u Binary-based tamper-resistant software solutions are not portable u Source level tamper resistant solutions are desirable to support multiple platforms and O/S’s

Cloakware Corporation8 Summary DRM Trust model very different u Broad distribution means some users will be malicious Cryptography is part of the solution Trusted Software Agents are required fo u Key hiding u Protecting the rights enforcement engine against tampering u Should be renewable and flexible Cloakware’s TRS technology u Portable source level technology u Protects against tampering and reverse engineering u Enables the manufacture of unique trusted software agents