An Efficient Software Protection Scheme

Slides:



Advertisements
Similar presentations
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Advertisements

1 MIS 2000 Class 22 System Security Update: Winter 2015.
GCSE PROJECT GUIDELINES Use this presentation to make sure you have the correct content for you project - click on.
REDUNDANT ARRAY OF INEXPENSIVE DISCS RAID. What is RAID ? RAID is an acronym for Redundant Array of Independent Drives (or Disks), also known as Redundant.
Jana Gudurić, 1014/2009 Slobodan Marković, 1039/2009 University of Belgrade, Faculty of Mathematics, Belgrade.
Prepared By: Certified Compliance Solutions, Inc. August 2012
Presenting DFA Results to Decision Makers 2003 CAS Research Working Party: Executive Level Decision Making using DFA Nathan Babcock, ACAS.
Powerpoint Presentation 1. The topic of the presentation meets the requirements of the assignment. (/5) 1. The topic of the presentation meets the requirements.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Progress Report Nizar R. Mabroukeh
A summary of the PSS-05 URD template
Figure 1.1 Interaction between applications and the operating system.
Connecting Minds 2010: The North American Psychology Undergraduate Research Conference June 4 th and 5 th, 2010 Kwantlen Psychology Department Keynote.
Distributed System Concepts and Architectures Summary By Srujana Gorge.
HOMEWORK PAGE STAND ALONE PROGRAMS FUNCTION ON THEIR OWN AND SOMETIMES CANNOT SHARE DATA WITH OTHER PROGRAMS. INTEGRATED SOFTWARE COMBINES.
Chapter 2 TCP/ IP PROTOCOL STACK. TCP/IP Protocol Suite Describes a set of general design guidelines and implementations of specific networking protocols.
Chapter S4: Verifiability All Sections. Security Today’s Topic Information Quality IS Basics E-commerce AccessExcel PowerPoint Types of IS Systems Development.
CASE Tools And Their Effect On Software Quality Peter Geddis – pxg07u.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
1 Project Management Principles Coursework Assignment: Things to pay attention to, for the report and the oral presentation...
Recommendations - Proposal Business Club at Elk College (BCEB) State Conference of Business Clubs Computer Systems Support, Inc. Fictional Presentation.
1 ISBT-128: It’s Finally Happening! KABB Spring Meeting March 10, 2007 Debra Bowman, MT(ASCP)SBB Quality Assurance Director Kentucky Blood Center.
THANKS BE TO GOD ALMIGHTY
What is a Network?. Definition of a computer network A computer network is a system in which computers are connected to share information and resources.
Introduction to Computers
ITEC224 Database Programming
Hardware Protection Against Software Piracy Tim Maude and Derwent Maude Communication of the ACM September 1984 Presentation by Gayathri Ramakrishnan.
CompSci 725 Handout 7: Oral Presentations, Projects and Term Reports Version July 2009 Clark Thomborson University of Auckland.
Information Systems. Features of Information Systems Read Page P88 Then use your research to complete the following slides.
Use of Hierarchical Keywords for Easy Data Management on HUBzero HUBbub Conference 2013 September 6 th, 2013 Gaurav Nanda, Jonathan Tan, Peter Auyeung,
D1.HGE.CL7.01 D1.HGA.CL6.08 Slide 1. Introduction Design, prepare and present reports  Classroom schedule  Trainer contact details  Assessments  Resources:
 Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). 
Advanced Principles of Operating Systems (CE-403).
Secure Systems Research Group - FAU 1 Active Replication Pattern Ingrid Buckley Dept. of Computer Science and Engineering Florida Atlantic University Boca.
An Efficient Software Protection Scheme Antonio Maña, Ernesto Pimentel Antonio Maña, Ernesto Pimentel University of Málaga, SPAIN in Trusted Information:
A Summary of the Distributed System Concepts and Architectures Gayathri V.R. Kunapuli
Software Testing for Intelligent Robots Justin Peckner Maria Velasquez November 13, 2012.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
LOGOPolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware Royal, P.; Halpin, M.; Dagon, D.; Edmonds, R.; Wenke Lee; Computer Security.
Enveloc ®, Inc. The Importance of Data Backup Enveloc, Inc. USA Technology & Research Park 775 N. University Blvd. Suite 110 Mobile, AL
1 G52IWS: Web Services Chris Greenhalgh. 2 Contents The World Wide Web Web Services example scenario Motivations Basic Operational Model Supporting standards.
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Smart Card And GSM Based Advanced Security System
Mr C Johnston ICT Teacher G055 - Lecture 16 The Pre-Release.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
Attacking an obfuscated cipher by injecting faults Matthias Jacob Dan Boneh Edward.
Dr D. Greer, Queens University Belfast ) Software Engineering Chapter 7 Software Architectural Design Learning Outcomes Understand.
CS457 Introduction to Information Security Systems
Hardware Protection Against Software Piracy
HTML 5 By Michael Hurley.
An Efficient Software Protection Scheme
Diamond Box Developed by: Darshan Patel 13bce071 Kirtik Patel 13bce078.
Frequently asked questions about software engineering
Required Course Project
RAID RAID Mukesh N Tekwani
CapEx Authorization Portal
An Introduction to Computer Networking
How to Use References Chapter 4.
TECHNICAL SEMINAR PRESENTATION
How to Mitigate the Consequences What are the Countermeasures?
Extreme Encounters…SHARKS!
Clinical Information System Security Policy (CISS Policy)
Software Requirements Specification (SRS) Template.
Introduction To Distributed Systems
RAID RAID Mukesh N Tekwani April 23, 2019
Summary Slide TELKOM SA LTD ORAL SUBMISSION
Introduction to Computers
Presentation transcript:

An Efficient Software Protection Scheme Antonio Maña, Ernesto Pimentel University of Málaga, Spain Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security, June 11-13, 2001, Paris, France. Presented by Matt Barrett, mbar116@ec.auckland.ac.nz

Summary The paper describes a software based protection scheme using smart-card based hardware tokens allowing Internet based software distribution, with a powerful license management system.

Appreciative Comment Thorough description of problem Well stated and defensible justification “…it is concluded that to obtain a provable secure protection scheme we must have a tamperproof processor that contains and executes the protected software.”

Critical Comment Unclear definition of schemes Error in diagrams Fail to separate two descriptions Error in diagrams Marked difference in clarity Explanations could be more concise

Scheme One

Scheme Two

Appreciative Comment Licensing management Free distribution over the Internet Easy recovery of lost licenses Transfer of licenses to other smart cards Expiration of license Extremely useful features, giving scheme a wide scope of usefulness

Discussion Just not practical for use with software “The cat is already out of the bag.” Could the principles of this scheme be modified for use with pure content?