An Efficient Software Protection Scheme

Slides:



Advertisements
Similar presentations
Beyond Compliance: Advanced SmartGrid Authentication Paul Miller Uniloc.
Advertisements

3SKey 3SKey.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Physical Unclonable Functions and Applications
1 Secure Credit Card Transactions on an Untrusted Channel Source: Information Sciences in review Presenter: Tsuei-Hung Sun ( 孫翠鴻 ) Date: 2010/9/24.
Towards A Theory Of Insider Threat Assessment Authors: Ramkumar Chinchani, Anusha Iyer Hung Q Ngo, Shambhu Upadhyaya International Conference on Dependable.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
FIT3105 Smart card based authentication and identity management Lecture 4.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Security Awareness: Applying Practical Security in Your World
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
FIGURE 1-1 A Computer System
Certificate and Key Storage Tokens and Software
Authentication and Payments 27 June 2000 Ann Terwilliger Product Director eCommerce Authentication Visa International.
Software Obfuscation from Crackers’ viewpoint Y, Hiroki; K, Yuichiro; M Akito, N Masahide; M Ken-ichi Proceedings of the IASTED International Conference.
Hardware Protection Against Software Piracy Tim Maude and Derwent Maude Communication of the ACM September 1984 Presentation by Gayathri Ramakrishnan.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
An Efficient Software Protection Scheme Antonio Maña, Ernesto Pimentel Antonio Maña, Ernesto Pimentel University of Málaga, SPAIN in Trusted Information:
3D PASSWORD FOR SECURE AUTHENTICATION
By: Nikhil Bendre Gauri Jape.  What is Identity?  Digital Identity  Attributes  Role  Relationship.
LOGOPolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware Royal, P.; Halpin, M.; Dagon, D.; Edmonds, R.; Wenke Lee; Computer Security.
Panel Session: Dependability and Security in Complex and Critical Information Systems Department of Communications and Information Engineering University.
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
A Cooperative Internet Backup Scheme [1] Leonid Bilevich Advanced Topics in Storage Systems [1]M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and.
Biometrics: A Tool For Information Security Anil K.Jain, Arun Ross, Sharath Pankanti IEEE Transactions on Information Forensics and Security, Volume 1,
1 Pascal URIEN, IETF 63th Paris, France, 2nd August 2005 “draft-urien-eap-smartcard-type-02.txt” EAP Smart Card Protocol (EAP-SC)
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
Fingerprinting Text in Logical Markup Languages Christian D. Jensen G.I. Davida and Y. Frankel (Eds.): Proc. Information Security Conference 2001, Lecture.
Creating Security using Software and Hardware Bradley Herrup CS297- Security and Programming Languages.
CRePE: Context-Related Policy Enforcement for Android Mauro Conti, Vu Thien Nga Nguyen and Bruno Crispo Proceedings of the 13 th International Conference.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Introduction Authentication Schemes Functionalities Required 3D Password selection and Input Virtual Environment Design Guidelines Applications Security.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
Key distribution Ján Kotrady. Content: What is key distribution? Key agreement and distribution Basic algorithm – Diffie-Hellman Basic attacks – Man in.
Identification (User Authentication). Model Alice wishes to prove to Bob her identity in order to access a resource, obtain a service etc. Bob may ask.
IT 242 Week 7 CheckPoint Firewalls To purchase this material link Week-7-CheckPoint-Firewalls For more courses.
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
OpenID and the Enterprise: A Model-based Analysis of Single Sign-On Authentication Jacob Bellamy-McIntyre Christof Luterroth Gerald Weber Published.
An Efficient Software Protection Scheme
Radius, LDAP, Radius used in Authenticating Users
Module 8: Securing Network Traffic by Using IPSec and Certificates
Symantec Code Signing Certificate
Organized by governmental sector (National Institute of information )
Tradeoff Analysis of Strategies for System Qualities
Elective: Technology Management
Elective: Technology Management
Elective: Technology Management
Elective: Technology Management
Elective: Technology Management
Elective: Technology Management
Taewan kang, Kevin huangfu
Security, Cryptography, and Magic
Introduction to Computers
Recent Developments on Multimedia and Secure Networking Technologies
Digital Repositories The management of learning objects
Student: Ying Hong Course: Database Security Instructor: Dr. Yang
Lori Hewig, IT Director David Martinez, Project Manager
CLIENT/SERVER COMPUTING ENVIRONMENT
What is a CMS. CMS is content management system CMS is a software that stores content.
Module 8: Securing Network Traffic by Using IPSec and Certificates
From Passwords to Public keys Chapter 10 ~ Chapter 12
Recent Developments on Multimedia and Secure Networking Technologies
Segmentation Observation: Programmers don’t think in pages!
Chapter Goals Discuss the CIA triad
COEN 351 Authentication.
Multi-Factor Authentication at SUNY
Presentation transcript:

An Efficient Software Protection Scheme Antonio Maña Ernesto Pimentel Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France. Xiaodong yang

Summary _____________________________________ Goal: “make the attack to the scheme difficult enough to discourage dishonest users” The scheme base on the hardware token (smart card) How is it work & what’s the problems? Interoperability, Capacity, Distribution, Delay

Easy to understand Completely explained Related works Appreciation comment _____________________________________ Easy to understand Completely explained Related works

Criticism comment _____________________________________ I don’t like using license to authenticate the code in scheme two Attacks: P6-Only one possible attack, but the author describe 2 attacks in the first scheme, 2 attacks in the second scheme.

Criticism comment con. _____________________________________ Why is it an “efficient” software protection scheme? Reference: [LMP00] … use Spanish, [LMP00] will give us some important information about the balance between security and efficiency but …

Comparison _____________________________________

Comparison _____________________________________

Question _____________________________________ Can we use other techniques (such as tamperproofing, watermarking) to authenticate the code rather than use license in the second scheme?

END _____________________________________