DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.

Slides:



Advertisements
Similar presentations
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Advertisements

Software and CD Protection V2 New, Better, Cracked in nearly the same way as before By: Chris Long.
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
White-Box Cryptography
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 5. Descifrado de formatos de archivo.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
1 Windows Media Rights Manager and FairPlay Seminar Digital Rights Management Clara Fernández de Castro.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
The Downside to DRM. What is DRM? “Digital Rights Management” Software used to control access to copyrighted material Protect company from piracy.
CSE331: Introduction to Networks and Security Lecture 36 Fall 2002.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
C opyright Protection and Digital Rights Management 1.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Physical Media Copy Protection By Wesley Wilson. Background Software Developers are shying away from PC game development due to piracy Software Developers.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Introduction to HASP ® Software DRM Solutions, Products, Benefits All Rights Reserved © Aladdin Knowledge Systems.
Digital Watermarking Parag Agarwal
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. M I C R O S O F T ® Preparing for Electronic Distribution Lesson 14.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 7. Ingeniería inversa de software malicioso.
CIS 450 – Network Security Chapter 8 – Password Security.
Copyright Protection Allowing for Fair Use Team 9 David Dobbs William Greenwell Jennifer Kahng Virginia Volk.
Encryption Objective 1: Explain data encryption procedures.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Types of Electronic Infection
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Compatibility and Interoperability Requirements
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Chapter Six Maintaining a Computer Part II: Installing, Repairing, and Removing Applications.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Lecture 2: Introduction to Cryptography
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
Compilers and Security
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Security Issues in Information Technology
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Applying Digital Watermarking Technology to Control CD copying
By Jake Schmitt, Seth Raleigh, Neil McLain
Digital Rights Management (DRM)
Encryption and Digital Rights Management
Presentation transcript:

DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking

Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions Cracking  Process of attacking a copy protection technology  One kind of reversing  Modification of an application’s binary to cause or prevent a specific key branch in the program’s execution

Cracking 1. Piratería y protección de copias 2. Tipos de protección 3. Conceptos avanzados de protección 4. Marca de agua

Piratería y protección de copias

Applying reverse engineering until the software cracker reaches the subroutine that containts the primary method of protecting the software Elimination of the expiration period from a time-limited trial of an application Scanning for the use of a commercial copy protection application (CD, DVD)  CloneCD  Alcohol 120%  Game Jackal  Daemon Tools

Piratería y protección de copias The open architecture of today’s personal computers makes impossible to create an uncrackable copy protection technology

Piratería y protección de copias Class break Problem in practically every copy protection technology Takes place when a security technology or product fails in a way that affects every user of that technology or product, and not just the specific system that is under attack Huge efforts of developers of copy protection technologies Problem Publishing the results of defeating the protection mechanism

Piratería y protección de copias copy protection mechanism Definition A delicate component Invisible to legitimate users Design considerations Resistance to Attack End-User Transparency Flexibility

Tipos de protección

Media-Based Protections  The primary copy protection approach in the 1980s  Idea: have a program check the media with which it is shipped and confirm that it is an original  Floppy disks: creating special “bad” sectors  Programs:  CopyWrite  Transcopy  Are they legals? Serial numbers  Idea: the software vendor ships each copy of the software with a unique serial number printed somewhere on the product package or on the media itself  The installation requires this number  If the program is installed, the user is registered  When the user contact customer support, the software vendor can verify that the user has a valid installation of the product

Tipos de protección Challenge response and online activations The program sends a challenge response (an protocol used for authenticating specific users or computers in networks) Idea: the both parties share a secret key that is known only to them Improvement to the serial number Challenge response Vendor’s approval Crackable: create a keygen program that emulates the server´s challegne mechanism and generate a valid response on demand

Tipos de protección keygen A license or product key generator (sometimes stylized as keygen) is a computer program that generates a product licensing key, serial number, or some other registration information necessary to activate for use a software applicationproduct licensing keyserial numbersoftware

Tipos de protección Hardware-based protections Idea: add a tamper- proof, non-software- based component into the mix assists in authenticating the running software Use of attached chip to the computer like USB

Conceptos avanzados de protección

Cripto-Processors A well-known software copy protection approach ProposedRobert M. Best Idea: design a microprocessor that can directly executed encrypted code by decrypting it on the fly Hard to crack because the decrypted code would never be accessible to attackers Digital Rights Management DRM Models  Encrypting the protect content  Try their best to hide the decryption key and control the path in which content flows after it has been decrypted

Conceptos avanzados de protección Digital Rights Management The Windows Media Rights Manager  Idea: separate the media from the licence file (encryption key required to decrypt and playback the media file) Digital Rights Management Secure Audio Path  Attempts to control the flow of copyrighted, unencrypted audio within Windows  Problem: anyone can write a simulated audio device driver that would just steal the decrypted content while the media playback software is sending it to the sound card

Marca de agua

Watermaking  Processing to adding an additional “channel” of imperceptible data alongside a visible stream of data  Invisble (or inaudible) data stream that is hidden within the file Properties  Difficult to remove  It contains as much information as possible  Imperceptible  Difficult to detect  Encrypted  Robust

Marca de agua aplicaciones Enabling authors to embed indentifying information in their intellectual property Identifying the specific owner of an individual copy by using a watermarked fingerprint Identifying the original,unmodified data through a validation mark

Bibliografía Reversing: Secrets of Reverse Engineering  Eldad Eilam  Wiley Publishing, Inc.  2005

Fin