Architecting Systems to Protect Intellectual Property Presentation to NZTE China Workshop Prof. Clark Thomborson Auckland NZ 16 th November 2007.

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

Computing Issues that Affect Us All lesson 30. This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment.
Digital Rights Management © Knowledge Books & Software, 2012.
Techniques for Software Watermarking and Fingerprinting Prof. Clark Thomborson Presentation at Tsinghua University 17 th March 2010.
Cloakware Corporation, 260 Hearst Way, Suite 311, Kanata, Ontario, Canada K2L 3H1 Spencer Cheng Trusting DRM Software Presentation.
Dynamic Self-Checking Techniques for Improved Tamper Resistance Bill Horne, Lesley Matheson, Casey Sheehan, Robert E. Tarjan STAR Lab, InterTrust Technologies.
Physical Unclonable Functions and Applications
Confidentiality and Privacy Controls
1 A Functional Taxonomy for Software Watermarking Jas Nagra, Clark Thomborson University of Auckland Christian Collberg University of Arizona.
Wmobf.1 1/5/00 Clark Thomborson Watermarking, Tamper-Proofing and Obfuscation – Tools for Software Protection Christian Collberg & Clark Thomborson Computer.
H Apr-01 Clark Thomborson Software Security CompSci 725 Handout 28: Report Writing #2 (Sample Titles & Abstracts) Clark Thomborson University of.
Digital Rights Management © Knowledge Books & Software, 2012.
18/03/2007Obfuscation 1 Software protection Mariano Ceccato FBK - Fondazione Bruno Kessler
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Ten –
Provided by OSS Watch Licensed under the Creative Commons Attribution 2.0 England & Wales licence
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Metamorphic Viruses Pat Walpole. Introduction What are metamorphic viruses Why they are dangerous Defenses against them.
Factors to be taken into account when designing ICT Security Policies
Internet Censorship. What is Internet Censorship Control or suppression of publishing or accessing information on the Internet Legal issues – Moral –
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
DELETE: THE VIRTUE OF FORGETTING IN THE DIGITAL AGE By Viktor Mayor-Schonberger.
Computer Ethics.
systemhound © Raxco Software Belgium systemhound PC inventory software.
What is Computer Security? for Professor Ruan’s Class at Nankai University Clark Thomborson 2 nd April 2007.
Methods for Software Protection Prof. Clark Thomborson Keynote Address at the International Forum on Computer Science and Advanced Software Technology.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. PUBLIC PUBLIC CO900G L03 - Design, Implement, and Manage FactoryTalk Security.
Could Software Watermarks Express Both Rules and Assurances? Prof. Clark Thomborson Presentation to the ReTRUST Group Villach, Austria 11 th March 2008.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Network Security & Accounting
How TPMs Can (and Should) Control Copyright Presentation to InternetNZ Copyright Workshop Prof. Clark Thomborson 13 th February 2007.
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
RISoft Development Inc. Business Overview October 2015.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
An Appropriate Design for Trusted Computing and Digital Rights Management Prof. Clark Thomborson 7 th April 2007.
Information Structure. Knowledge Theory The boundary between what can be mechanized and what must forever remain a human judgment or value decision is.
Applying Software Obfuscation to Malicious Code Teigh Berg.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
European Workshop “Using Open Educational Resources for enhancing e-Mentoring” Open Educational Resources using HTML: theory and practise Aurimas Kisielius.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data.
Compilers and Security
Srinivas Balivada USC CSCE548 07/22/2016.  Cookies are generally set server-side using the ‘Set-Cookie’ HTTP header and sent to the client  In PHP to.
Importance of IT security ->protects data ->ensures authentication and confidentiality ->preevents data theft.
Defense In Depth: Minimizing the Risk of SQL Injection
Security Models and Designing a Trusted Operating System
Software Security Testing
Pentagon of Self-Defense
An Efficient Software Protection Scheme
Intellectual Property Lecture CS 495 Senior Project Phase I
POPULAR POWER Security Issues of Peer-to-Peer Systems
Computing Issues that Affect Us All
Learning Area 1 Information And Communication Technology and Society
Confidentiality and Privacy Controls
Software Watermarking Deterring Software Piracy
O.
Application protection
Obfuscation in .NET Atchyutuni Shilpa CS-795.
Encryption and Hacking
Computing Issues that Affect Us All
Computing Issues that Affect Us All
Operating System Concepts
Security in SDR & cognitive radio
Network Locations in Windows 7
COSC-100 (Elements of Computer Science) Prof. Juola
Software Security SC Lecture 2: Software Law
Presentation transcript:

Architecting Systems to Protect Intellectual Property Presentation to NZTE China Workshop Prof. Clark Thomborson Auckland NZ 16 th November 2007

Lessig’s Taxonomy of Control LegalIllegal Moral Immoral EasyDifficult Inexpensive Expensive Easy Difficult Ideally: it would be difficult, immoral, expensive, and illegal for anyone to misappropriate your IP. IP theft

Defense in Depth for Software IP 1.Prevention: a)Don’t allow unauthorised use (licence control). b)Don’t let anyone read your code (black box). c)Don’t let anyone decipher your code (encryption). d)Don’t let anyone understand your code (obfuscation). e)Don’t let anyone modify your code (tamper-proofing). 2.Detection: a)Monitor subjects (user logs). Requires user ID and user surveillance. b)Monitor uses (execution logs). Requires code ID (hashing or watermarking) and platform surveillance. c)Monitor objects (inventory logs). Requires code ID, storage surveillance. d)Monitor platforms (platform logs). Requires tamper-evident platforms and platform surveillance. 3.Response: a)Automated. Requires a trusted platform which can “call for help”. b)Offline. Requires a trusted inspector (to read the logs).