Hardware Protection Against Software Piracy

Slides:



Advertisements
Similar presentations
Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Advertisements

TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Jeff Bilger - CSE P 590TU - Winter 2006 The Role of Cryptography in Combating Software Piracy.
White-Box Cryptography
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Superdistribution --- The Concept and the Architecture Ryoichi Mori and Masaji Kawahara presented by Ping Xu 1. Introduction to Superdistribution 2. Protect.
Software Development and Software Loading in Embedded Systems.
Encryption Methods By: Michael A. Scott
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Sinaia, Romania August, TH Workshop “Software Engineering Education and Reverse Engineering” Dhuratë Hyseni, Betim Çiço South East European University.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Hardware Protection Against Software Piracy Tim Maude and Derwent Maude Communication of the ACM September 1984 Presentation by Gayathri Ramakrishnan.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
1 CC1002NP: Problem Solving for IT Lecture for week 1.
DNA Computing BY DIVYA TADESERA. Contents  Introduction  History and its origin  Relevancy of DNA computing in 1. Hamilton path problem(NP problem)
Flow of presentation:  Kind of attacks on embedded systems.  Most relevant security threats faced by NOC.  Solutions/ways suggested so far to deal.
Chap 8. Sequencing and Control. 8.1 Introduction Binary information in a digital computer –data manipulated in a datapath with ALUs, registers, multiplexers,
Christopher Kruegel University of California Engin Kirda Institute Eurecom Clemens Kolbitsch Thorsten Holz Secure Systems Lab Vienna University of Technology.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
An Efficient Software Protection Scheme Antonio Maña, Ernesto Pimentel Antonio Maña, Ernesto Pimentel University of Málaga, SPAIN in Trusted Information:
Cryptography is the process of encryption and decryption a message or data. Examples: Banking to keep peoples money safe Schools so we can keep students.
1 Diversifying Sensors to Improve Network Resilience Wenliang (Kevin) Du Electrical Engineering & Computer Science Syracuse University.
Lecture 2: Introduction to Cryptography
Welcome Topic : Security.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
The Digital Battery From: Budd, T.A. "Protecting and Managing Electronic Content with a Digital Battery". IEEE Computer (2001) 2-8. Steve Lord.
Black + White = Grey Ethical Issues Surrounding the Creation and Distribution of Hacker Tools Used in Distributed Denial of Service Attacks Joseph Levine.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Zong-Cing Lin 2007/10/31.  Algorithm Description  Why chose Rijndael  Reference.
Security in Opened versus Closed Systems – The Dance of Boltzmann, Coase and Moore Presented By Chad Frommeyer.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Privacy and the Law.
Hardware-rooted Trust for Secure Key Management & Transient Trust
Security, Social and Legal Issues Regarding Software and Internet
Security Using Armstrong Numbers and Authentication using Colors
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Symmetric and Asymmetric Encryption
Hardware Protection Against Software Piracy
Protect Your Hardware from Hacking and Theft
4. NCdisk SP-based SoC Architecture 5. NCdisk Security Protocol
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
ABYSS : An Architecture for Software Protection
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
STEGANOGRAPHY.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Methods for Preventing Unauthorized Software Distribution
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Year 10 ICT ECDL/ICDL IT Security.
Applying Digital Watermarking Technology to Control CD copying
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Defending against malicious hardware
Chapter 3:Cryptography (16M)
Mitigation Principles PROPOSAL OICA/CLEPA
User-mode Secret Protection (SP) architecture
Student: Ying Hong Course: Database Security Instructor: Dr. Yang
VPN: Virtual Private Network
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Ethical Hacking.
– Communication Technology in a Changing World
The Internet: Encryption & Public Keys
Title Introduction: Discussion & Conclusion: Methods & Results:
Digital Signature Standard (DSS)
A New Method of Cryptography II:
Presentation transcript:

Hardware Protection Against Software Piracy Published 1984 Tim Maude and Derwent Maude Presented by Mark Noble

Introduction(1) Author’s intent is to discourage piracy by making it more effort than it’s worth Pirates might Duplicate for friends (copying) Copy for resale (counterfeiting) Discover algorithms (reverse engineering) Proposed System designed for protection against (1) and to a degree (2)

Introduction (2) The authors give details on the Hardware aspect of the security unit Software aspect of the security unit Encryption algorithm for protecting the software Execution of the protected software Possible methods of attack

Security Unit Consists of RAM, ROM and a CPU Functions are decryption, runtime instruction execution and runtime control Security Unit’s Private Key is coded into the ROM Decryption SU Key RT control CPU RAM

Software Preparation Software Software is protected by Segmenting the code Randomly reordering the segments Move Runtime path control into the Security Unit Encrypt software with vendor’s public key Encrypt Vendor’s Private Key with Security Unit’s public key RT control Encoded SW

Software Startup On Startup, Vendor’s Private Key is decrypted using the Security Unit’s private key Decoded Key moved to RAM Decryption SU Key Encoded SW RAM

Runtime Execution During runtime, instructions are passed to the Security Unit, decrypted using the Vendor’s Private Key and then executed If required, results are passed back Decryption Encoded SW CPU RAM

Runtime Control Branch and case statement decisions are made in the runtime controller At the end of each code segment, the Security Unit’s runtime controller is called to determine which segment is executed next RT control Encoded SW CPU RAM

Conclusion Basic ideas of the paper are good but the hardware, software and cryptography need to be updated Hardware protection makes hacking an order of magnitude more difficult The protection suggested in this paper is adequate for an average person (“Duplicating for a friend” and possibly “Copy for Resale” ), but, in my opinion, it will not stop a determined hacker Q How much more secure is a hardware and software combination compared with software only?