Digital Rights Management and Trusted Computing Kari Kostiainen T-110.7200 Special Course in Operating System Security April 13 th 2007.

Slides:



Advertisements
Similar presentations
Operating Systems Components of OS
Advertisements

Secure Virtual Machine Execution Under an Untrusted Management OS Chunxiao Li Anand Raghunathan Niraj K. Jha.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Computer Software 3 Section A Software Basics CHAPTER PARSONS/OJA
Vpn-info.com.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Implementing an Untrusted Operating System on Trusted Hardware.
Chapter 6 Security Kernels.
1 Bootstrapping Trust in a “Trusted” Platform Carnegie Mellon University November 11, 2008 Bryan Parno.
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Government Online – White Paper Companion – Copyright © 2007 Credentica Inc. All Rights Reserved. This presentation is animated. Press the “space bar”
Trusted Disk Loading in the Emulab Network Testbed Cody Cutler, Mike Hibler, Eric Eide, Rob Ricci 1.
Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.
1 Web Server Administration Chapter 3 Installing the Server.
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Applied Cryptography for Network Security
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
Operating Systems.
Financial Transactions on Internet Financial transactions require the cooperation of more than two parties. Transaction must be very low cost so that small.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
Kenichi Kourai (Kyushu Institute of Technology) Takuya Nagata (Kyushu Institute of Technology) A Secure Framework for Monitoring Operating Systems Using.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Extending user controlled security domain.
A Design of Trusted Operating System Based on Linux BY LI HONGJUAN, LANYUQING The presenter Rusul J. ALSaedi Spring 2015 CS Dr. Rothstein.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
An approach to on the fly activation and deactivation of virtualization-based security systems Denis Efremov Pavel Iakovenko
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is.
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
Module 15 Managing Windows Server® 2008 Backup and Restore.
Ihr Logo Operating Systems Internals & Design Principles Fifth Edition William Stallings Chapter 2 (Part II) Operating System Overview.
(c) Mitsubishi Electric Corp. 1 User Scenarios & Security Considerations in APPAGG part 2/ Nobuhiro Electric.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Key Agreement for Heterogeneous Mobile Ad-hoc Groups (µSTR-H) Mark Manulis Horst-Görtz Institute, Bochum (Germany)
Information Security in Distributed Systems Distributed Systems1.
Trusted Infrastructure Xiaolong Wang, Xinming Ou Based on Dr. Andrew Martin’s slides from TIW 2013.
Wireless and Mobile Security
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
NTHU CS ISLAB 國立清華大學 資訊工程研究所 資訊安全實驗室 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S. Messerges Ezzat A. Dabbish Speaker:Wu.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Introduction to Operating Systems Concepts
Hardware-rooted Trust for Secure Key Management & Transient Trust
Trusted Computing and the Trusted Platform Module
Hardware security: The use of a Trusted Platform Module
4. NCdisk SP-based SoC Architecture 5. NCdisk Security Protocol
Trusted Computing and the Trusted Platform Module
Chapter 2: System Structures
Information and Network Security
Enhancing Web Application Security with Secure Hardware Tokens
Assignment #7 – Solutions
AEGIS: Secure Processor for Certified Execution
SCONE: Secure Linux Containers Environments with Intel SGX
Shielding applications from an untrusted cloud with Haven
Aimee Coughlin, Greg Cusack, Jack Wampler, Eric Keller, Eric Wustrow
Presentation transcript:

Digital Rights Management and Trusted Computing Kari Kostiainen T Special Course in Operating System Security April 13 th 2007

First paper: Enabling fair use with trusted computing (unpublished draft)

Motivation Good DRM system should enable various use cases Listening a song three times before purchase Renting a movie so that it can be watched only once Moving a purchased song from one device to another Enforcing this kind of stateful licenses is difficult in open platforms Reverting the system to a previous state is easy  the movie can be watched again Existing solutions are not satisfactory Obfuscation and rootkits Online solutions Dongles and smardcards This paper presents an architecture that enables enforcement of stateful licenses on open platforms using trusted computing

Security objectives License integrity and enforcement All parties must enforce licenses and unauthorized alteration must be infeasible Freshness Replay-attacks must be infeasible License availability Usage without online connectivity must be possible Privacy The system should preserve users’ privacy

System model Strong isolation between compartments Trusted channels bound to configurations of compartments In principle all compartments could be located on different machines

Implementation Hardware layer: normal PC hardware with TPM Virtualization layer: based on L4-family microkernels (Xen could be used as well) Trusted software layer: based on PERSEUS security architecture Application layer: legacy operating system (para-virtualized Linux) and security critical applications

System startup Normal TPM-based boot sequence BIOS measures master boot record (MBR) before giving control to it MBR measures kernel before giving control to it and so on… Uses modified GRUB boot loader The Compartment Manager (CM) measures other compartments, legacy operating systems and applications before executing them

Establishing trusted channels TPM creates cert BIND using AIK TPM creates PK BIND and SK BIND RC compares to known comp_conf LC and TCB_conf RC creates a secret key sk TPM verifies that TCB_conf is same TM verifies that comp_conf LC is same Verify signature using AIK

Secure storage overview Storage Manager maintains metadata index that logs usage of securely stored items To maintain freshness the index also manages a software counter that is incremented synchronously with TPM 1.2 monotonic hardware counter  Provides protection against attacks that try to revert into previous state

Using secure storage Sealed against TCB configuration Same TCB configuration TPM counter check missing?

Second paper: Enabling advanced mobile DRM scenarios N. Asokan and Jan-Erik Ekberg

Example use case Timo has purchased a song using his mobile device Anna would like to listen the song as well Timo transfers the song to Anna’s device for limited free listening If Anna wants to continue listening she must commit to purchasing the song for herself Constant online connectivity should not be needed How to implement a system like this that provides flexible and fair use of purchased content without allowing unauthorized use?

Conceptual architecture DRM device is a tamper-resistant module Protocol engine contains the actual DRM enforcement logic Different payment methods can be plugged into this architecture

Types of rights and transfers Each piece of content has two types of rights Usage rights that govern local use Transfer rights that specify how new rights can be created for different devices Different kind of transfers are possible: Give: once the right is transferred the original device cannot use the content anymore Copy: a new right is created for the new device

Vouchers determine rights Each piece of content is encrypted with a content key Rights for a piece are embodied in a voucher that contains Description of content Description of rights Content key encrypted using public key of target device Sequence number for freshness MAC for integrity When rights are transferred the sending device creates a new voucher for the target device Sending device must check that target device is compliant

Metering and reporting new rights Creation of new rights must be metered and reported Otherwise, unauthorized copying could take place New created right can be either sender-reported or receiver-reported Preview vouchers are special case of receiver-reported voucher Unreported voucher is marked as report-pending When a proof of reporting is inserted into device, the report-pending voucher is converted into an unconstrained one If the number of report-pending vouchers exceeds a certain limit, the device could be disabled in some fashion

Lifecycle of vouchers

Rights transfer protocol

Requirements from platform The user cannot make modifications in the OS kernel OS processes cannot access each other’s memory areas Small tamper-resistant secure storage for kernel which can be used to bootstrap larger secure storage Process claiming to be DRM engine must be authenticated Integrity checks could be used

Implementation

Own thoughts about these paper and DRM in general:

Own thoughts The DRM system should be flexible, so that users can consume legally purchased content on all of their devices This means that all devices should be compliant  all devices should have TPM or something similar Will device manufacturers put TPM to 20 € MP3 player? I don’t think so Thus, these schemes do not seem promising for music If TPMs get very popular in PCs use cases like enforcement of software license or video rental might work But even then it would be difficult to get all audio and video device drivers accepted

Thank you!