ENHANCED CONTENT PROTECTION OVERVIEW. Security Solution Characteristics Comprehensive security ecosystem All devices meet the same standard – No assumption.

Slides:



Advertisements
Similar presentations
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
A new Network Concept for transporting and storing digital video…………
Baryons Software Solutions. ONLINE FILM & VIDEO PUBLISHING PLATFORM Online Film & Video Publishing is a solution for launching, ticketing, and distributing.
Cloakware Corporation, 260 Hearst Way, Suite 311, Kanata, Ontario, Canada K2L 3H1 Spencer Cheng Trusting DRM Software Presentation.
SECAM Systems Product Presentation SECAM Systems © 2010.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
Hardware Security: Trusted Platform Module Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Figure 1.1 Interaction between applications and the operating system.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
4K CONTENT PLAN Sony Pictures Technologies. The 4k Consumer Value 4k has to offer all of these features: – Higher resolution – Richer colors (wider color.
Software Design Division 秘 CONFIDENTIAL Panther Content Security Mar. 14, 2014 Sony Corporation.
4K CONTENT PLAN Sony Pictures Technologies. Consumer Offering Broadcast (Over the air, cable, satellite, IPTV) Premium Content (Movies, episodic TV) Premium.
Cloud Control Senior Project Summer Overview Cloud Control is a platform to control data transmission to/from internet connected devices from the.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Mac OS Lion Memory Forensics Using IEEE 1394 to Bypass FileVault 2 Full Volume Encryption. Todd Garrison September 18, 2011.
1 UCR Firmware Attacks and Security introduction.
SafeZone® patent pending 1 Detect. Inform. Prevent. Metcalf Attack #2 August 27, 2014 SafeZone® Detect. Inform. Prevent.
Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends.
Watermarking Video Content What is video watermarking? November 2010 Rajaram Pejaver Note: The views presented here are solely those of.
CHAPTER FOUR COMPUTER SOFTWARE.
4K. Contents Context Online required? UltraViolet connection.
Protecting Data on Smartphones and Tablets from Memory Attacks
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
F1 Cross-Company Call Follow Up Process Flow against Security Breach on F1 Phase 1 6.iii.2013 Sony Confidential.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
WCL323. Why should we care? One of the fastest growing & largest categories Opportunity for new business models (services, content, subscriptions)
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Copyright 2014 Intel Corporation. All rights reserved. Taking Advantage of Digital Security & Surveillance January 2014.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Information Security What is Information Security?
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
F1 BOX/SECURITY/SERVER SYSTEM SPTECH FEEDBACK(DRAFT2) 12012/9/21Sony/SPTech Confidential.
Towards a Software Architecture for DRM Joint work with Kristof Verslype, Wouter Joosen, and Bart De Decker DistriNet research.
VeriShield Protect Revolutionary technology that simplifies PCI DSS compliance with no system upgrades Now available on V x Solutions!
IS3220 Information Technology Infrastructure Security
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Security of Broadcast Networks 1. Overview r Broadcast networks are used mostly for TV r Historical development r Commercial models r One-way or Two-way.
Digital Rights Management (DRM) Kamil Kaminski. Personal Example, Playing a Blu-ray Disc Blu-ray and BD+/AACS encryption:  AACS (Advanced Access Content.
Windows Vista Configuration MCTS : Media Applications.
Principles Identified - UK DfT -
SPE Expectations Leverage existing delivery technologies
4k Content Delivery Sony Pictures Technologies.
Sony Pictures Technologies
Content protection for 4k
4k Discussion Sony Pictures.
4k Theoretical Discussion
How to allow USB Flash Drive Scan in Avast Antivirus.
Wavestore Integrates…
4K Content protection overview
4K Content protection overview
4K Content protection overview
Designed for powerful live monitoring of larger installations
We secure the communication
Presentation transcript:

ENHANCED CONTENT PROTECTION OVERVIEW

Security Solution Characteristics Comprehensive security ecosystem All devices meet the same standard – No assumption that any particular class of devices is more difficult to hack “Hack once, hack all” is not possible – Breach limited to a single title Breach response is rapid – Within days Security solution provider has a proven track record Similar idea of per title diversity as BD+ but very different approach – BD+ is not effective

High-Level Model of Video Path

Decryption / Decoding Threats – Attacker extracts Device Key – Attacker extracts Content Key – Attacker captures decrypted compressed content – Attacker captures decrypted uncompressed content Mitigations – Software diversity per title – Decode in Trusted Execution Environment – Device keys protected by a Hardware Root of Trust – Require 3rd party verification of trusted DRM software

Framebuffer Threats – Attacker captures raw frames from framebuffer E.g. Screen scraping Mitigations – Use protected framebuffer (e.g. TrustZone) – Use secured links to video hardware (e.g. Nvidia)

HDCP Source Threats – Attacker captures raw frames from hacked driver – Attacker captures raw frames from hacked video hardware Mitigations – Require HDCP 2.1 for source devices and repeaters HDCP 2.x increases security and robustness – Never send unencrypted frame data to video drivers/hardware – Only send frame data to protected video hardware on SoC (e.g. TrustZone) – Require 3rd party verification of trusted hardware

HDCP Sink Threats – Attacker captures video from HDMI to screen driver interface – Attacker uses HDCP stripper with valid HDCP 1.x Device Keys Since attackers can generate valid HDCP 1.x device keys revocation is ineffective Mitigations – Require HDCP 2.0 or higher for sink devices – HDCP source only transmits premium content to HDCP 2.x devices

Screen Threats Threats – Attacker captures video from screen using camera Mitigations – Security solution inserts forensic watermark that can be used to identify user account and playback device

Breach Management Security provider monitors Internet (websites, chat rooms, IRC, etc) for indications of security breaches Security provider works with manufacturers to identify circumventions used by attackers Countermeasures developed and deployed immediately a breach is detected Some new content may prevent playback on certain devices until firmware is up-to-date

Example of Renewability on Android/ARM 1.Integrity Validation insures that no tampering has occurred both before and during playback 2.If Integrity Validation fails, out-of- date can be updated transparently 3.Platform may provide a means for DRM components to trigger a firmware update as required 4.Platform has the option of renewing OS and TrustZone components or leaving consumer with a device that won’t play content

Example: Current NDS Security Solutions FunctionCurrent NDS Platform Support AndroidIOSWindowsMacOSPS3XBox CE (TV, Blu-ray) Software diversity ✔✔✔✔ Trusted Execution Environment TrustZon e Intel, AMD Custom in SoC Hardware Root of Trust ✔ ✔ (Win8) Secure boot, root/jailbreak detect ✔✔ ✔ (Win8) Integrity Validation ✔✔✔ Watermark insertion ✔✔✔✔ Breach monitoring & response ✔✔✔✔

Security Management