DIGITAL RIGHT MANAGEMENT Bùi Thành Đ ạ t 50700480 Nguy ễ n Hoàng Nh ậ t Đông 50700542 Nguy ễ n Duy C ườ ng 50700287 1.

Slides:



Advertisements
Similar presentations
Key Management Nick Feamster CS 6262 Spring 2009.
Advertisements

Compliance and Robustness Rules for Windows Media DRM Implementations Microsoft Corporation.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Protecting Software Code By Guards - by Hoi Chang and Mikhail J. Atallah “Many software-based mechanisms for protecting program code are too weak[…] or.
Cloakware Corporation, 260 Hearst Way, Suite 311, Kanata, Ontario, Canada K2L 3H1 Spencer Cheng Trusting DRM Software Presentation.
Digital Rights Management: The Technology behind the Hype Mark Stamp Department of Computer Science San Jose State University.
DIGITAL RIGHTS MANAGEMENT Hoang Viet Lam Tran Quoc Trieu 1.
Computer Science 654 Lecture 5: Software Reverse Engineering Professor Wayne Patterson Howard University Spring 2009.
Software Part 4  Software 2 Software Reverse Engineering (SRE)
White-Box Cryptography
Class 25: Security through Complexity? Karsten Nohl cs302: Theory of Computation University of Virginia, Computer Science PS6 is due today. Lorenz cipher.
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
Software Hardening & FIPS 140 Eugen Bacic & Gary Maxwell September 27th, 2005.
Digital Rights Management © Knowledge Books & Software, 2012.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions.
© 2007 Aladdin Knowledge Systems Ltd. All rights reserved. Aladdin, Aladdin Knowledge Systems, the Aladdin Knowledge Systems logo, HASP, HASP SRM, HASP.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
18/03/2007Obfuscation 1 Software protection Mariano Ceccato FBK - Fondazione Bruno Kessler
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Part 4  Software 1 Conclusion Part 4  Software 2 Course Summary  Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis.
The MediaSnap ® Digital Rights Management System Priti Sabadra and Mark Stamp Department of Computer Science San Jose State University.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Reverse Engineering Ian Kayne For School of Computer Science, University of Birmingham 2 nd February 2009.
Lecture 11 Reliability and Security in IT infrastructure.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
SRE  Introduction 1 Software Reverse Engineering (SRE)
Encryption Methods By: Michael A. Scott
Introduction to HASP ® Software DRM Solutions, Products, Benefits All Rights Reserved © Aladdin Knowledge Systems.
Cryptography Week-6.
FORESEC Academy FORESEC Academy Security Essentials (IV)
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Confidential. For use within only Slide 1 iOS and Android content protection requirements Version 0.2 Sony Pictures Entertainment Tim Wright.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
Lecture 2: Introduction to Cryptography
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
DIGITAL SIGNATURE.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Security By Duncan Hall.
Private key
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Network Security Celia Li Computer Science and Engineering York University.
Protecting Software Code By Guards Hoi Chang and Mikhail J. Atallah CERIAS, Purdue University and Arxan Technologies, Inc.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Fall 2006CS 395: Computer Security1 Key Management.
Computer and Information Security Chapter 12 Insecurity in Software 1.
A Partial Survey of the Perfect Digital Watermark Problem.
Information Systems Design and Development Security Precautions Computing Science.
Web Applications Security Cryptography 1
Attacking an obfuscated cipher by injecting faults
csci5233 computer security & integrity (Chap. 4)
Outline Using cryptography in networks IPSec SSL and TLS.
Security Flaws 2 Ian Kayne
Computer and Information Security
Presentation transcript:

DIGITAL RIGHT MANAGEMENT Bùi Thành Đ ạ t Nguy ễ n Hoàng Nh ậ t Đông Nguy ễ n Duy C ườ ng

C ONTENTS SOFTWARE REVERSE ENGINEERING (SRE) What is SRE ? Tools How to prevent Conclusion DIGITAL RIGHT MANAGEMENT (DRM) What is DRM ? Problems and solutions A real world system Some DRM system designs Conclusion 2

C ONTENTS SOFTWARE REVERSE ENGINEERING (SRE) What is SRE ? Tools How to prevent Conclusion DIGITAL RIGHT MANAGEMENT (DRM) What is DRM ? Problems and solutions A real world system Some DRM system designs Conclusion 3

W HAT IS SRE ? Software reverse engineering (reverse code engineering, or reverse). Purpose: Good: understand malware, legacy code... Not good: cheating, breaking DRM systems : 55 pushl %ebp : 89 e5 movl %esp,%ebp : eb 02 jmp 0x : 06 pushl %es

T OOLS FOR SRE Disassembler Debugger Hex editor DISASSEMBLYDEBUGPATCH 5

D ISASSEMBLER 6

H EX EDITOR 7

C ONTENTS SOFTWARE REVERSE ENGINEERING (SRE) What is SRE ? Tools How to prevent Conclusion DIGITAL RIGHT MANAGEMENT (DRM) What is DRM ? Problems and solutions A real world system Some DRM system designs Conclusion 8

H OW TO PREVENT SRE ? DISASSEMBLYDEBUGPATCH ANTI-DISASSEMBLY ANTI-DEBUGGING TAMPER RESISTANCE 9

H OW TO PREVENT SRE ? A NTI -D ISASSEMBLY Encryption: encrypt before executed. Problem: Code must be decrypted before executed -> attacker can access decryption code. 10

H OW TO PREVENT SRE ? A NTI -D ISASSEMBLY False assembly Make the real code different from the disassemblied one. Problem: attacker studies the technique carefully -> bypass the effects of false assembly. 11

H OW TO PREVENT SRE ? A NTI -D ISASSEMBLY False assembly 12 jmp antidebug1 + 2 antidebug1:.short 0xc606 call reloc reloc: popl %esi jmp antidebug2 antidebug2: addl $(data - reloc),%esi movl 0(%esi),%edi pushl %esi jmp *%edi data:.long 0

H OW TO PREVENT SRE ? A NTI -D ISASSEMBLY Self-modifying code: real time, effective to confuse a disassembler. Problem: Also confuse developers. Difficult to implement and error prone. 13

H OW TO PREVENT SRE ? A NTI -D EBUGGING Monitoring debug registers. Monitoring breakpoints. Multi threads. 14

H OW TO PREVENT SRE ? T AMPER R ESISTANCE Guards: Some sections of code calculate checksum of another section. From “single point of failure” to “area of failure”. Problems: All guards are the same -> easy to detect. Different classes of guards -> still able to be detected. Conclusion: Code has not been altered only if guards themselves have not been altered. 15

H OW TO PREVENT SRE ? T AMPER R ESISTANCE Obfuscation: make the code difficult to understand. Examples: “Spaghetti code” Opaque predicate 16

H OW TO PREVENT SRE ? T AMPER R ESISTANCE Metamorphism Normally: distribute identical copies (clones) of software to each customer. Weakness: can’t prevent break-one-break- everywhere (BOBE) 17

H OW TO PREVENT SRE ? T AMPER R ESISTANCE Metamorphism (cont) Use metamorphic copies: same function, different internal structure. For N copies, it takes N times to break all N instances (best case) Usually use in malware. Note: same flaw still exists in all copies. 18

C ONCLUSION Truly secure software is impossible to achieve in practice. Solution: just provides sufficient protection Confusing. Hard to understand. Increase the time required for an attack. 19

C ONTENTS SOFTWARE REVERSE ENGINEERING (SRE) What is SRE ? Tools How to prevent Conclusion DIGITAL RIGHT MANAGEMENT (DRM) What is DRM ? Problems and solutions A real world example Some DRM system designs Conclusion 20

W HAT IS DRM ? Retain some control over digital content after it has been delivered: “remote control” What happen? 21 PUBLISHED For the Hack of it

W HAT IS DRM ? Persistent protection: the protection stays with the content after it’s delivered. Example: for a digital book: No copying Read once Do not open until Christmas No forwarding

C ONTENTS SOFTWARE REVERSE ENGINEERING (SRE) What is SRE ? Tools How to prevent Conclusion DIGITAL RIGHT MANAGEMENT (DRM) What is DRM ? Problems and solutions A real world system Some DRM system designs Conclusion 23

P ROBLEMS AND S OLUTIONS PROBLEMS From SRE section: can’t prevent SRE -> can’t hide a secret in software. Analog hole: impossible to prevent such attacks 24

P ROBLEMS AND S OLUTIONS SOLUTIONS Options: Honor system Assuming most people are good, honest, decent, and trustworthy Example: shareware Weak software-based DRM Example: DRM for P2P Application Strongest possible DRM system Example: A real world system 25

P ROBLEMS AND S OLUTIONS SOLUTIONS Cryptography: different from standard crypto scenario. Legitimate recipient is a potential attacker. A recipient can access everything in dashed box (including key). How to solve ? 26

P ROBLEMS AND S OLUTIONS SOLUTIONS Security by obscurity: secure when attacker doesn’t understand the software completely. When obscurity gone, security gone It’s preferable not rely on security by obscurity, but need to consider when there is no other option. Closed systems, secret designs 27

C ONTENTS SOFTWARE REVERSE ENGINEERING (SRE) What is SRE ? Tools How to prevent Conclusion DIGITAL RIGHT MANAGEMENT (DRM) What is DRM ? Problems and solutions A real world system Some DRM system designs Conclusion 28

S OME DRM SYSTEM DESIGNS A REALWORLD SYSTEM MediaSnap Inc. DRM system: Use with digital documents that will be distributed via . Components: Secure Document Server (SDS) Client software is a plugin to Adobe PDF reader. 29

S OME DRM SYSTEM DESIGNS A REALWORLD SYSTEM Deliver 30

S OME DRM SYSTEM DESIGNS A REALWORLD SYSTEM Access 31

S OME DRM SYSTEM DESIGNS A REALWORLD SYSTEM Security for system The SDS is relatively secure. The DRM client software is readily available to any attacker. Focus on the client software 32

S OME DRM SYSTEM DESIGNS A REALWORLD SYSTEM Tamper-resistant barrier Anti-disassembly: encryption, false assembly Anti-debugging: monitor debug registers Tamper-resistant techniques: AES, along with “scrambling” algorithm Anti-screen capture, digital watermarking Metamorphism for BOBE resistance 33

C ONTENTS SOFTWARE REVERSE ENGINEERING (SRE) What is SRE ? Tools How to prevent Conclusion DIGITAL RIGHT MANAGEMENT (DRM) What is DRM ? Problems and solutions A real world system Some DRM system designs Conclusion 34

S OME DRM SYSTEM DESIGNS DRM FOR STREAMING DATA Possible attacks on streaming media: Spoofing the stream Man-in-the-middle Replay attack Plaintext captured at the client The proposed design makes use of scrambling algorithms. Achieve significant degree of metamorphism Security by obscurity 35

S OME DRM SYSTEM DESIGNS DRM FOR STREAMING DATA Details: Server has list N scrambling algorithm s 0, s 1, s 2,..., s N-1 Each client has a subset of these algorithms LIST = {s12, s23, s45, s2, s7} This list is store as E(LIST, K server ) Client and server must negotiate a specific scrambling algorithm to be used. 36

S OME DRM SYSTEM DESIGNS DRM FOR STREAMING DATA 37

S OME DRM SYSTEM DESIGNS DRM FOR P 2 P APPLICATION Example 38

S OME DRM SYSTEM DESIGNS DRM FOR P 2 P APPLICATION Peer offering service (POS) Legal provider Apparent to users Significant percentage of responses Use weak DRM 39

S OME DRM SYSTEM DESIGNS DRM IN ENTERPRISE DRM in enterprise is different from DRM in e-commerce: Prevent losing money instead of making money The human dimension is completely different Other issues are more important than the strength of DRM system: Policy management Authentication Relatively easy to solve. 40

C ONCLUSION DRM clearly illustrates the limitations of doing security in software Strong software-based DRM is impossible due to SRE problems DRM is not only a technical problem, so the challenge is to develop something that works in practice. 41

42