Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Seven.

Slides:



Advertisements
Similar presentations
Cloakware Corporation, 260 Hearst Way, Suite 311, Kanata, Ontario, Canada K2L 3H1 Spencer Cheng Trusting DRM Software Presentation.
Advertisements

Lecture 19 Page 1 CS 111 Online Protecting Operating Systems Resources How do we use these various tools to protect actual OS resources? Memory? Files?
Trends in Licensing Models NINCH Copyright Town Meeting March 23, 2002 ARLIS-NA/VRA.
Trusted Computing Platforms Blessing or Curse? by Bastian Sopora, Seminar DRM 2006.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing -Lecture Twelve.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Ten –
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Drs.
CSE331: Introduction to Networks and Security Lecture 36 Fall 2002.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Dr.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing - Lecture Fifteen.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Eleven.
Digital Asset Protection in Personal Private Networks Imad Abbadi Information Security Group Royal Holloway, University of London
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Six –
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing - Lecture Fourteen.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Nine –
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Five –
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
Software Development and Software Loading in Embedded Systems.
Bus. Computer Applications Supervised by: t. Ahmed Abu msameh Prepared by Mohammed fathi al – amawi ID : CCTV systems.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Hands-On Microsoft Windows Server 2008
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
CH 6 Configuring Server Hardware and power options.
Week #7 Objectives: Secure Windows 7 Desktop
Development, Marketing, Licensing, and Distribution.
1 Digital Rights Management Dissenting Argument: Users of Digital Media should obey digital rights management systems to guarantee the integrity and protect.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1 Higher Computing Topic 8: Supporting Software Updated
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Specialist communication channel. Sarah-Jane king.
Who owns the Bits? Digital copyright issues are continually evolving. IP address do not map to a single person – hard to trace user Music and movie industry.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Chapter Six Maintaining a Computer Part II: Installing, Repairing, and Removing Applications.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
Security Technology Clients and Mail Servers
Module 8 : Configuration II Jong S. Bok
Copyright © Clifford Neuman and Dongho Kim - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE September Integrating Policy with Applications.
CSE 303 Concepts and Tools for Software Development Richard C. Davis UW CSE – 11/29/2006 Social Implications Discussion 4 – Digital Rights Management.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Copyright Laws How to Get Permission? By: Ruth Garza EDTC
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Digital Rights Management (DRM) Kamil Kaminski. Personal Example, Playing a Blu-ray Disc Blu-ray and BD+/AACS encryption:  AACS (Advanced Access Content.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Preparing Your Apps for Publication Test your app thoroughly on a variety of devices. The app might work perfectly using the emulator on your.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Chapter 3 Installing and Learning Software
Fair Use in the Classroom
Who owns the Bits? Digital copyright issues are continually evolving.
THE STEPS TO MANAGE THE GRID
Who owns the Bits? Digital copyright issues are continually evolving.
Presentation transcript:

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Seven – Digital Rights Management February 23, 2007 Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Applications Trusted computing is there to support specific applications with specific policies that might be hard to enforce on machines outside of the control of the entity needing the policies enforced. The first of the applications we will discuss is the one most closely tied to trusted computing. –Digital rights management (DRM)

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE TC Applications and Policy The issues that are addressed by most applications are issues of policy. TC is able to better support many of these policies than can be supported without TC. DRM is all about policy –Who can access protected content. –What they can do with protected content. –How long they can do it for. –TC is what protects the content from being accessible to applications that will not enforce the policies.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Protected Interests DRM primarily protects the content provider or content owner. –That content will not be accessible to applications that do not enforce content provider specified restrictions on access. Typical DRM does not consider protection for other interests that SHOULD be protected: –That the users private data is not disclosed or used for other than purposes agreed to. –That added software to which the user does not agree is not installed on their system. –That the user should be able to access content to which they have legitimate access even if the provider changes their mind.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Negotiation of Interests User’s can choose to relinquish some right in exchange for others: –Reduced cost –Ability to access needed data. Such negotiation should be based on informed acceptance. It should be based on balanced interests, though often it will not.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE DRM Today Software –Usually through code obfuscation –Licensing keys –Hardware dongles Media (audio / video) –Encryption ▪Embedded keys (obfuscated or hardware) –Programs or devices enforce policy Problems with approaches –Often cracked –Special program embed extra behavior –Lack of portability across devices

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE DRM Problems Often cracked Special program embed extra behavior Lack of portability across devices The Analog hole

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE DRM Problems Cracking of DRM –Often just a matter of de-obfuscation –Find keys embedded in software –Find keys embedded in hardware and distributed among others –Inability to distribute new keys means it is hard to revoke the keys that have been stolen –Inability to change encryption on existing instance of objects causes similar problem.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Blu-Ray and HD-DVD Crack The keys were discovered –Initially, just the keys for individual titles, which allowed decryption of the disks and dissemination of content. –More recently, the processing key discovered, that which enables decryption of all the disks made. –Determined by recording changes to certain parts of memory during startup. –Example of de-obfuscation.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Bonus Code DRM enabling application often –Collect usage information, sometimes for marketing purposes. –Slow down your system. –Like to stay resident when not using the protected content. –Report back about what else is installed. –Enable automatic updates (downloading of new versions). –Have been known to open your system to other malicious activities – whether intentionally or through carelessness.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE No Portability Each content distributor has its own stack that works with its own content. –Doesn’t allow integrated management by users. –Requires lots of extra software. But this is a standards issue, and isn’t necessary fixed by TC.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE The Analog Hole Once content is “scanned” outside the protected devices, it can no longer be controlled. –Protections are removed. Industry wants to make everything DRM enabling. –Whether for access to content or not. –Imposes costs on others. –No longer “negotiated”.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE User perceived DRM Problems From Wired –Region coding – even though fair use, forces one to breach technical measures. –Disabling functionality in Verizon phones. –Subsequent changes to ability to access that which one has paid for.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE How TC can help Reduce reliance on obfuscation. Base policies can be enforced in common by OTS software, not different policies for each content stack. Possibility to raise the point of commonality of policies to provide better portability. –But it is a hard human problem and might not be possible.