Superdistribution --- The Concept and the Architecture Ryoichi Mori and Masaji Kawahara presented by Ping Xu 1. Introduction to Superdistribution 2. Protect.

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Autonomic Systems Justin Moles, Winter 2006 Enabling autonomic behavior in systems software with hot swapping Paper by: J. Appavoo, et al. Presentation.
ICS103 Programming in C Lecture 1: Overview of Computers & Programming
Lecture 1: Overview of Computers & Programming
Low Cost Attack on Tamper Resistant Devices Ross Anderson, Markus Kuhn Songpol Manoonpong.
Physical Unclonable Functions and Applications
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Traitor Tracing Papers Benny Chor, Amos Fiat and Moni Naor, Tracing Traitors (1994) Moni Naor and Benny Pinkas, Threshold Traitor Tracing (1998) Presented.
S EMINAR A SELF DESTRUCTING DATA SYSTEM BASED ON ACTIVE STORAGE FRAMEWORK ONON P RESENTED BY S HANKAR G ADHVE G UIDED BY P ROF.P RAFUL P ARDHI.
Chapter 21 Successfully Implementing The Information System
Chapter 1 – Introduction
CS533 - Concepts of Operating Systems
SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
Website on Computer Security By: Brittany Freeman.
Protocols and the TCP/IP Suite
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
G53SEC 1 Reference Monitors Enforcement of Access Control.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Peter Gurník, Oldřich Trégl Satellite based train location.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.
Identity-Based Secure Distributed Data Storage Schemes.
Smart card security Nora Dabbous Security Technologies Department.
Smart Card Technology & Features
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Operating System What is an Operating System? A program that acts as an intermediary between a user of a computer and the computer hardware. An operating.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
G53SEC 1 Reference Monitors Enforcement of Access Control.
Operating Systems Lecture November 2015© Copyright Virtual University of Pakistan 2 Agenda for Today Review of previous lecture Hardware (I/O, memory,
Human Tracking System Using DFP in Wireless Environment 3 rd - Review Batch-09 Project Guide Project Members Mrs.G.Sharmila V.Karunya ( ) AP/CSE.
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Electronic Analog Computer Dr. Amin Danial Asham by.
AUTHORS – X. NIE, D. FENG, J. CHE, X. WANG PRESENTED BY- PREOYATI KHAN KENT STATE UNIVERSITY Design and Implementation of Security Operating System based.
A little hardware; a little software CS 139 – 08/29/07.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Tamper Resistant Software: An Implementation By David Aucsmith, IAL In Information Hiding Workshop, RJ Anderson (ed), LNCS, 1174, pp , “Integrity.
Prepared By: Razif Razali 1 TMK 264: COMPUTER SECURITY CHAPTER SIX : ADMINISTERING SECURITY.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
The Digital Battery From: Budd, T.A. "Protecting and Managing Electronic Content with a Digital Battery". IEEE Computer (2001) 2-8. Steve Lord.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Software Security Seminar - 1 Chapter 10. Using Algorithms 발표자 : 이장원 Applied Cryptography.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
1.3 Operating system services An operating system provide services to programs and to the users of the program. It provides an environment for the execution.
ICT Unit 4: Network and the effects of using them
Computer Security: Chapter 5 Operating Systems Security.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Computer Systems Nat 4/5 Computing Science Computer Structure:
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
Hardware Protection Against Software Piracy
4. NCdisk SP-based SoC Architecture 5. NCdisk Security Protocol
ABYSS : An Architecture for Software Protection
STEGANOGRAPHY.
ICS103 Programming in C Lecture 1: Overview of Computers & Programming
Connecting Networks Repeater: physical layer Bridge: data link layer
Session III Architecture of PLC
Lecture 1: Foundation of Network Security
Chapter 2: System Structures
Operating Systems Lecture 3.
Physical Unclonable Functions and Applications
Plc & scada applications
Erica Burch Jesse Forrest
Presentation transcript:

Superdistribution --- The Concept and the Architecture Ryoichi Mori and Masaji Kawahara presented by Ping Xu 1. Introduction to Superdistribution 2. Protect Module 3. Conclusion

1. Introduction to superdistribution Superdistribution --- an approach to distributing software, so that:  software is available freely and without restriction, but in encrypted form  users pay for the use of the software product, not for possessing it  software is protected from modifications  the software's using terms, conditions and fees are set by the owner  this approach relies neither on law nor ethics, instead through the Superdistribution Architecture --- a combination of electronic devices, software, and administrative arrangements

1. Introduction to superdistribution S-box --- every computer must be equipped with an S-box ( Superdistribution box ) --- which is the very heart of the Superdistribution Architecture --- a hardware device which contains microprocessors, RAM, ROM, and a real-time clock. The S-box preserves secret information (such as a deciphering key), and it is implemented as a protected module.

2. Protected Module a protected module is an information container that defends the contained information from attacks. There are two kinds of protected modules: analogue --- for example,by monitoring the changing of resistance digital --- I will discuss this one next

2. Protected Module --- digital Tactic --- by closely spaced detectors and wiring between two layers A detector is an RAM cell. The detectors are individually addressable, and each one can be read or written. A protected layer consists of a great number of detectors, closely spaced. Layers of detectors can be staggered so as to increase the effective density.  With closely spaced and staggered, the center- to-center distance of adjacent detectors can be made as small as 3 * 10 ^ -6 meter.

2. Protected Module --- digital

Wiring between two layers not only provides signal paths but also provides an additional level of protection. If an attack is detected:

2. Protected Module --- digital Attack detect --- the procedure is as follows: write a random value into the detector and read it back  write the complement of that value into the detector and read it back  if retrieved value != written value, a possible attack is indicated  repeat the test several more times to make sure not a transient error  test other detectors in the physical vicinity of the erroneous one  if number of faulty detectors > a threshold, an attack happens!

3. Conclusion In my presentation: –First, I introduce the superdistribution --- an approach to distributing software. –Then, I mainly specify the digital protected module --- which uses the detectors to ensure that nobody can physically invade the protected region without destroying one of the detectors.

3. Conclusion Today, encryption algorithms trend to not expose the algorithms themselves, but are put in some hardware devices. Clipper is such an example. This paper has similar idea to this trend, it concentrates on the whole, involving hardware and software architecture, to guarantee the whole system’s security. It is worth a careful reading.

QUESTION(discussion) If such a protected module must be equipped when you run software or encryption algorithms(in other words, no such a module exists, they cannot execute.), what are the advantages? the disadvantages? What if you are the developer(producer)? What if you are a user?