Hardware Protection Against Software Piracy Tim Maude and Derwent Maude Communication of the ACM September 1984 Presentation by Gayathri Ramakrishnan.

Slides:



Advertisements
Similar presentations
Gareth Ellis Senior Solutions Consultant Session 5a Key and PIN Management.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Microprocessors Typical microprocessor controlled devices: Camera, mobile phone, stereo, mp3 player, electronic toys… High-level microprocessor controlled.
Elements of a Microprocessor system Central processing unit. This performs the arithmetic and logical operations, such as add/subtract, multiply/divide,
Saturday, 09 September 2006 ©RSH Number Prime Numbers and Prime factors.
Parts & Functions of a Computer. 2 Functions of a Computer.
Chapter 17 Controls and Security Measures
8.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Module 12 Computation and Configurations Formal Definition Examples.
Computer Organization and Assembly language
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 1 Introducing Hardware.
Introduction to Information Systems
CP1610: Introduction to Computer Components Basic PC Components.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Compressed Instruction Cache Prepared By: Nicholas Meloche, David Lautenschlager, and Prashanth Janardanan Team Lugnuts.
1 © Unitec New Zealand Embedded Hardware ETEC 6416 Date: - 10 Aug,2011.
Computer maintenance chapters 1-7 review By Benjamin Houlton.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
2nd Meeting Computer Essential. Can you named these parts of computer?
FROM CONTROL SOFTWARE TO CONTROL SYSTEMS Wojciech Kurek.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 1 Introducing Hardware.
CCS APPS CODE COVERAGE. CCS APPS Code Coverage Definition: –The amount of code within a program that is exercised Uses: –Important for discovering code.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS.
Introduction to Programming Lecture No. 1. Books  Deitel & Deitel :– C++ How to Program  Kernighan and Ritchie:- The C Programming Language.
1 FAQ’S ABOUT WAP Presented By Abhilash Pillai CSCI 5939-Independent Study.
 DEFINE COMPUTER ? EXPLAIN CLASSIFICATION OF COMPUTER.  WHAT ARE INPUT AND OUTPUT DEVICES OF COMPUTER ? EXPALIN OUTPUT DEVICES.  WHAT ARE MEMORY AND.
How computers work The CPU & Memory. The parts of a computer.
Sandrine AGAGLIATE, FTFC Power Consumption Analysis and Cryptography S. Agagliate Canal+Technologies P. Guillot Canal+Technologies O. Orcières Thalès.
An Efficient Software Protection Scheme Antonio Maña, Ernesto Pimentel Antonio Maña, Ernesto Pimentel University of Málaga, SPAIN in Trusted Information:
1 Diversifying Sensors to Improve Network Resilience Wenliang (Kevin) Du Electrical Engineering & Computer Science Syracuse University.
By Dinesh Bajracharya Nepal Components of Information system.
1 Information Systems CS-507 Lecture Types of Controls Access Controls – Controlling who can access the system. Input Controls – Controls over how.
C++ Programming Basic Learning Prepared By The Smartpath Information systems
J. Stover, CSD-HS.  A computer is an electronic device that is programmed to accept data (input), process it into useful information (output), and store.
Computer Science 210 Computer Organization Control Circuits Decoders and Multiplexers.
Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
FDR--ECE6276 Class Project 12/06/00 The ChooChoo: Final Design Review System Integration Software School of Electrical and Computer Engineering Georgia.
Programming Fundamentals Lecture No. 2. Course Objectives Objectives of this course are three fold 1. To appreciate the need for a programming language.
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
Version 02U-1 Computer Security: Art and Science1 Correctness by Construction: Developing a Commercial Secure System by Anthony Hall Roderick Chapman.
HOW COMPUTERS WORK THE CPU & MEMORY. THE PARTS OF A COMPUTER.
KEYBOARD INTERFACING Keyboards are organized in a matrix of rows and columns The CPU accesses both rows and columns through ports. ƒTherefore, with two.
CompTIA A+ Guide to Managing & Maintaining Your PC By: JEAN ANDREW Computer Maintenance Chapter 1: Computer Basics Knowledge.
Reviewing Reports. Can you match them from memory? Definition (Listen and write) Introduction The facts which have been discovered. Findings Practical.
Decimalisation Table Attacks for PIN cracking “ It takes an average of 15 guesses to determine a four digit PIN using this technique, instead of the 5000.
Attacking an obfuscated cipher by injecting faults Matthias Jacob Dan Boneh Edward.
Sebastián Álvarez Henao.. It refers to all physical parts of a computer system; its components are: electrical, electronic, electromechanical and mechanical.
Information Systems Design and Development Security Precautions Computing Science.
Memory Protection through Dynamic Access Control Kun Zhang, Tao Zhang and Santosh Pande College of Computing Georgia Institute of Technology.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Inside a Computer. Computer Hardware/Software What is the difference? Computer Hardware.
Hardware Protection Against Software Piracy
Hardware Protection Against Software Piracy
4. NCdisk SP-based SoC Architecture 5. NCdisk Security Protocol
An Efficient Software Protection Scheme
An Efficient Software Protection Scheme
More Devices: Control (Making Choices)
Chapter 1.1 Fundamentals of Computer systems
Intro Cyber forensics needs direction and definition
Computer Science 210 Computer Organization
Unit I Flash Cards Start.
The method invocation mechanism and the System Stack
 Is a machine that is able to take information (input), do some work on (process), and to make new information (output) COMPUTER.
Computer Architecture
Internal components of a computer.
Presentation transcript:

Hardware Protection Against Software Piracy Tim Maude and Derwent Maude Communication of the ACM September 1984 Presentation by Gayathri Ramakrishnan

Summary of the Paper  Definition and classification of Software Piracy  Methods that were currently in use  Working of the Proposed System  Hardware Security Unit  Software Aspect  Automation of Software Encryption  Possible Methods of Attack

Hardware Security Unit  Hardware Security Unit Connected to Input- Output Port of the Computer  Each computer provided with public and private key  Private Key is hidden into the PROM of the Security unit and made electrically unreadable by fusing links connecting memory cells to the programming pins

Software Aspect A B C D - Program D A B C D A B C D A B Compiled Program Critical Steps Encrypted C Public Key Information Encrypted In the Program by vendor Final Program

Working of the System  At program start-up “decoding key” which contains information about the public key is passed to the security unit  Security unit deciphers the decoding key  Then program executes and pass encrypted instruction to the unit.  Security unit deciphers the instruction and value would be returned

Appreciative Comments Concepts explaining about introducing several levels of complexity in the system Begin Point:= unit(3,8,0); Case point of 1: GOTO 1; 3: GOTO 2; 6: GOTO 3 ; END; 1: sieve := sieve –[ j ] ; Case point of 1 : GOTO 4 ; 2: GOTO 9; 3: GOTO 7 END; 2: primes := primes + [ next ]; Point := unit( 1,next,0 ); Unit(3,8,0) Value :1 Unit(8,1) Value :2 Security Unit

Critical Comments Functioning of the Security unit has not been explained properly Functioning of the Security unit has not been explained properly Protection of the Private Key Protection of the Private Key Could be discovered ! Could be discovered ! Explanation about using public key cryptogram is very difficult to understand Explanation about using public key cryptogram is very difficult to understand

Questions Is this Software Protection Scheme reliable? Is this Software Protection Scheme reliable? Security unit lost, damaged or stolen ! Security unit lost, damaged or stolen ! How can we improve the system? How can we improve the system? PC Add on card?