Wissenschaftliche Bewertung von DRM-Systemen Scientific evaluation of DRM systems
|
|
- Susanna Rich
- 7 years ago
- Views:
Transcription
1 Wissenschaftliche Bewertung von DRM-Systemen Scientific evaluation of DRM systems Hannes Federrath Adversary model Strength of existing systems Tendencies DRM technologies Summary
2 What is the scope of the attacker? More general: What are the security demands? confidentiality of content integrity of content availability of content Confidentiality: protection against piracy copy one content copy every content in a certain time frame break the entire system (copy every message at every time) Integrity: authorized access to content protection of ownership of content Availability: prevention of denial of service attacks
3 Adversary model Security depends on the supposed strength of the attacker. Resources Money Time Knowledge insider or outsider The existence of specialized tools shifts the knowledge to anybody concerning organizational aspects (secrecy of master encryption keys) concerning design secrets (e.g. of protection functionality in hard- and software) Who wants to attack a system? Hobbyist (naïve attacker, no financial efforts) Serious attacker (intelligent, probably no financial efforts) Professional attacker (intelligent, financial motivation)
4 Strength of existing systems Very limited protection Most systems protect against hobbyists DRM systems realized in software no or nearly no protection against serious attacks DRM systems realized in hardware weak protection against serious attacks In the best case: Technical components of DRM systems consist of special adapted and well-known IT security functions Worst case: Content contains proprietary DRM signals or functions without any special protection
5 Tendencies Pirates try to reverse engineer DRM systems make them useable on other platforms (Linux, ) make them independent of a certain hardware and software seller Pirates in the Internet shift their activities to services peer-to-peer services anonymous communication services Pirates may use Trojan Horses to get content illegally This is a very subtle and serious thread! Attackers make their knowledge public as automated tools Hobbyists can now do professional attacks
6 DRM Technologies Basic IT security technologies Encryption Tamper resistant hardware devices Special designed DRM technologies Fingerprinting Watermarking Naïve security mechanisms Regional coding of content Filter mechanisms Incompatible formats and media DRM codes without any protections against removing content detection copy protection
7 Design Options for Copy Protection Protect pay-services from unauthorized access Content Provider Attacker Domain Key Key Content in LoFI Content Encryption Distribution Decryption Digital Analogue
8 Design Options for Copy Protection Protect pay-services from unauthorized access Content Provider Attacker Domain Key Key Content in LoFI Content Encryption Distribution Decryption Hardware Make distributed signal difficult to use or copy timing signals in transmitted signal copy resistant media Digital Analogue
9 Design Options for Copy Protection Content Provider Attacker Domain Content Distribution Transformation Transformation Hardware integrated output device digital HiQ signal never leaves the hardware Digital
10 Never! Too dangerous! Content Provider Attacker Domain Content Distribution Transformation Transformation Content HiQ and digital Software Attacker Personal Computer
11 What is possible in software? Content Provider Attacker Domain Content DRM signal f Distribution Detector Software Content HiQ, digital and with DRM signal Useful for watermarking and fingerprinting Does not prevent redistribution but makes it better recognizable Digital
12 What is possible in software? Content Provider Attacker Domain Content DRM signal f Attention! Scope Distribution changing! Detector Not: Protection against illegal copying Software But: Detection of copies Content HiQ, digital and with DRM signal Useful for watermarking and fingerprinting Does not prevent redistribution but makes it better recognizable Digital
13 DRM Technologies Basic IT security technologies Encryption Tamper resistant hardware devices Special designed DRM technologies Fingerprinting Watermarking Naïve security mechanisms Regional coding of content Filter mechanisms Incompatible formats and media DRM codes without any protections against removing content detection
14 Broadcast encryption Attacker Domain k1 Master encryption key Multicast crypt encrypted stream to all users individual decryption key contains a fingerprint of the user ID number / registration necessary Traitor tracing: if illegal copy is detected the legal customer can be traced back Only secure if both encrypted and decrypted signal contains fingerprint decrypt Client 1 k2 decrypt Client 2 k3 decrypt Client 3... individual decryption keys
15 > LoFi Broadcast, HiFi Encryption filter broadcast : delta key 1 crypt Client 1 key 2 crypt Client 2 key 3 crypt Client 3.. Divide stream into quality layers. Everybody gets the low quality layer Paying customers get encrypted layers MP3: division of mp3 stream into quality layers costs are linear in the number of users
16 DRM Technologies Basic IT security technologies Encryption Tamper resistant hardware devices Special designed DRM technologies Fingerprinting Watermarking Naïve security mechanisms Regional coding of content Filter mechanisms Incompatible formats and media DRM codes without any protections against removing content detection
17 Watermarking Content Provider Attacker Domain Content DRM signal f Distribution Detector Software Content HiQ, digital and with DRM signal Watermarking: Goal: Protection of authorship Not: Protection against illegal copying Possible: Detection of copies Digital
18 Watermarking Scope: Protect authorship of digital content correlation necessary few 100 bit strong changes Key Distribution Original Embedding Watermark Signal: Copyright (C) 1998 Document-ID: #A53-229D789 Author: J.Fitzgerald Title: White Christmas Attacker
19 > Watermarking Digital-Analogue-Conversion Analogue-Digital-Conversion Re-Sampling Re-Quantization Compression Dithering Rotation Translation Cropping Scaling attacker Collusion Attacks Copyright (C) 1998 Document-ID: #A53-229D789 Author: J.Fitzgerald Title: White Christmas
20 > Security of watermarking systems Theory robustness non-interference detectability Praxis: (attacks by M. Kuhn, F. Petitcolas, 1997) StirMark Software removes watermarks watermark is no longer detectable Mosaic Attack divides web images into a mosaic of tabular cells browser reconstructs the view of the image
21 Stirmark Attack non-linear transformation of a picture synchronization gets lost no anchor for detector to find the position of embedded signal
22 Mosaic Attack divides web images into a mosaic of tabular cells uses html statements browser reconstructs the view of the image protects from very simple web robots that look for illegally distributed material 1.jpg 2.jpg 3.jpg
23 DRM Technologies Basic IT security technologies Encryption Tamper resistant hardware devices Special designed DRM technologies Fingerprinting Watermarking Naïve security mechanisms Regional coding of content Filter mechanisms Incompatible formats and media DRM codes without any protections against removing
24 Naïve security mechanisms examples Filter mechanisms Client Additional encryption Gateway Provider 1 Access blocked by gateway Proxy Server illegal content Provider 2
25 Naïve security mechanisms examples copy protection in videos recorders DVD player analogue video signal contains DRM signal copy in bad quality only video recorder
26 Naïve security mechanisms examples copy protection in videos recorders DVD player analogue video signal contains DRM signal reconstruction copy in bad of correct quality only signal non-sensitive pre-amp video recorder sensitive pre-amp
27 Naïve security mechanisms examples DRM codes without any protections against removing digital audio player digital audio digital recorder MD, CD-R (Audio), DAT Original: copy bit unset Copy: content with copy bit set
28 Naïve security mechanisms examples DRM codes without any protections against removing digital audio player digital audio digital recorder MD, CD-R (Audio), DAT Original Copy Reset copy bit to make copies Copy !
29 Naïve security mechanisms examples incompatible formats and media audio player OK Original computer Read Error, No copies, No playing
30 Naïve security mechanisms examples incompatible formats and media audio player OK Original computer CloneCD Read No playing, Error, No but copies, copy for No audio playing player Copy audio player OK!
31 Basic security goals and corresponding technologies security goal technologies conditional access / autorized access copy prevention detection encryption tamper resistant hardware devices fingerprinting integrity protection protection of ownership watermarking
32 Secure DRM systems Secure DRM systems connect a DRM signal with the content to protect in a way that the content signal is useless without the DRM signal. Options: DRM signal is part of the content signal (e.g. in watermarking systems) DRM signal is necessary to access/decrypt the encrypted content signal Important point: Detection of DRM signal cannot be bypassed Hardware or software encapsulation Software not recommendable Hardware breaking is a matter of time and money
MovieLabs Specification for Enhanced Content Protection Version 1.0
MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies
More informationDIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
More informationDIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com
DIGITAL WATERMARKING: FOSTERING AND ENHANCING LEGITIMATE PEER-TO-PEER (P2P) ECOSYSTEMS DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com Copyright 2006 1 TABLE OF CONTENTS
More informationQiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.
Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents
More informationAn Incomplete Cryptography based Digital Rights Management with DCFF
An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp
More informationDigital Rights Management in the Internet
Digital Rights Management in the Internet Jason But jbut@swin.edu.au Internet Applications Email Text/data transfer between individuals (one-to-one distribution of content) WWW Content publication (one-to-many
More informationWHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION
www.digitalwatermarkingalliance.org WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION Consider where you encounter digital
More informationIPTV Primer. August 2008. Media Content Team IRT Workgroup
TV Primer August 2008 Media Content Team IRT Workgroup What Is TV? TV is the delivery of video and audio programming via Internet Protocol () over a broadband network TV can run on a converged network
More informationDigital Rights Management
2009 Levente Buttyán - piracy and DRM - basic model and architecture of DRM systems -MS Windows DRM -why DRM is bad? - content fingerprinting and watermarking - software protection techniques Introduction
More informationCITADEL: A Content Protection Architecture for Decentralized Peer-to-Peer File Sharing Systems
: A Content Protection Architecture for Decentralized Peer-to-Peer File Sharing Systems Paul Judge and Mostafa Ammar College of Computing, Georgia Institute of Technology, Atlanta, GA 30332 {judge,ammar}@cc.gatech.edu
More informationDigital Rights Management Demonstrator
Digital Rights Management Demonstrator Requirements, Analysis, and Design Authors: Andre Osterhues, Marko Wolf Institute: Ruhr-University Bochum Date: March 2, 2007 Abstract: This document describes a
More informationSoftware Piracy Overview of Anti-Tampering Technologies. Scott Baeder Sr. Architect Cadence Design Systems baeder@cadence.
Software Piracy Overview of Anti-Tampering Technologies Scott Baeder Sr. Architect Cadence Design Systems baeder@cadence.com 0 Agenda Quick Review of Piracy Binary Hacking Crackers Workflow First Impressions
More informationExperimental DRM Architecture Using Watermarking and PKI
Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,
More informationEnforcing Regional DRM for Multimedia Broadcasts with and without Trusted Computing
Enforcing Regional DRM for Multimedia Broadcasts with and without Trusted Computing Ulrich Greveler Horst Görtz Institute for IT Security Ruhr University Bochum Germany ulrich.greveler@nds.rub.de This
More informationGetting Started Guide
Snap-Link Mobile allows you to monitor and control lights, security, audio, temperatures and webcams on handheld mobile devices, such as Smartphones, PDAs or other devices running Windows Mobile operating
More information7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
More informationSync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
More informationAudio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?
ENEE408G Lecture-9 Last Lecture Digital Watermarking and Fingerprinting for Digital Rights Protection of Multimedia URL: http://www.ece.umd.edu/class/enee408g/ Slides included here are based on Spring
More informationAEL Data Services LLP. LEKTZ - Digital Rights Management (DRM) Solutions
AEL Data Services LLP LEKTZ - Digital Rights Management (DRM) Solutions Overview Though digitization of assets provides business with a lot of benefits with respect to - ease of reproduction, distribution,
More informationSSL A discussion of the Secure Socket Layer
www.harmonysecurity.com info@harmonysecurity.com SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
More informationE-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.
Copyright 2007 Pearson Education, Inc. Slide 5-1 E-commerce business. technology. society. Second Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 5-2 Chapter
More informationContent Protection in Silverlight. Microsoft Corporation
Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting
More informationSecure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
More informationSecurity and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
More informationDigital Transmission Content Protection (DTCP) Technical and Licensing Overview
Digital Transmission Content Protection (DTCP) Technical and Licensing Overview 1 Overview DTCP as part of Home Network Protection Framework Link Protection Technology and Licensing Chain DTCP Technical
More informationTechnical aspects of Digital Rights Management
Technical aspects of Digital Rights Management Emilija Arsenova MI, RWTH-Aachen Table of content 1 Introduction... 3 2 Digital Rights Management (DRM)... 3 2.1 DRM Architecture...4 2.2 DRM Techniques...5
More informationTrue Identity solution
Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright
More informationA Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
More informationAdvanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
More informationInternet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
More informationWeb-Conferencing System SAViiMeeting
Web-Conferencing System SAViiMeeting Alexei Machovikov Department of Informatics and Computer Technologies National University of Mineral Resources Mining St-Petersburg, Russia amachovikov@gmail.com Abstract
More informationVersion 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)
Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................
More informationProtecting Movies from Piracy with Microsoft DRM by Jonathan Lewin
Protecting Movies from Piracy with Microsoft DRM by Jonathan Lewin For those of us who make commercially valuable sound movie recordings of our computer screen activity, one of the most important questions
More informationWEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
More informationContent Protection and Security Considerations for 5G KILROY HUGHES 2015.08.20
Content Protection and Security Considerations for 5G KILROY HUGHES 2015.08.20 5G Content Protection and Security Topics 1. Is that a computer in your pocket? (or, are you just happy to see me? Mae West)
More informationMULTIMEDIA CONTENT PROTECTION VIA BIOMETRICS-BASED ENCRYPTION. Umut Uludag and Anil K. Jain
Copyright 22 IEEE. Published in the 23 International Conference on Multimedia and Expo (ICME 23), scheduled for July 6-9, 23 in Baltimore, Maryland, SA. Personal use of this material is permitted. However,
More informationQuick Start. Guide. The. Guide
Quick Start 1 Quick Start Introducing VirtualDub Working with video requires a variety of tools to achieve the best possible results. re are some processes for which dedicated-purpose tools can be invaluable
More informationWatermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
More informationAlaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
More informationReal-Time DMB Video Encryption in Recording on PMP
Real-Time DMB Video Encryption in Recording on PMP Seong-Yeon Lee and Jong-Nam Kim Dept. of Electronic Computer Telecommunication Engineering, PuKyong Nat'l Univ. sylee9997@pknu.ac.kr, jongnam@pknu.ac.kr
More informationSecurity White Paper The Goverlan Solution
Security White Paper The Goverlan Solution The Goverlan Administration Suite (which includes the following modules: Administration & Diagnostics, Remote Control, Scope Actions, and WMIX) is a powerful
More informationA Robust Multimedia Contents Distribution over IP based Mobile Networks
, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering
More informationLecture 12: Software protection techniques. Software piracy protection Protection against reverse engineering of software
Lecture topics Software piracy protection Protection against reverse engineering of software Software piracy Report by Business Software Alliance for 2001: Global economic impact of software piracy was
More informationNext Tuesday. Digital Rights Management. Outline. Basic Problem. Copyright Crawler. Content hashing
CS 155 Spring 2006 Next Tuesday Digital Rights Management John Mitchell Paul Kocher President and Chief Scientist Cryptography Research, Inc. 2 Basic Problem Joey writes and records a song Song distributed
More informationIntroduction of Fujitsu DRM Solution for Marlin DRM/MPEG-DASH Solutions
Introduction of Fujitsu DRM Solution for Marlin DRM/MPEG-DASH Solutions March, 2013 FUJITSU LIMITED Introduction Fujitsu was dealing with the creating open specification of DRM from about 20 years ago.
More informationebus Player Quick Start Guide
ebus Player Quick Start Guide This guide provides you with the information you need to efficiently set up and start using the ebus Player software application to control your GigE Vision or USB3 Vision
More informationUser Manual of Web Client
User Manual of Web Client 1 Index Chapter 1 Software Installation... 3 Chapter 2 Begin to Use... 5 2.1 Login and Exit... 5 2.2 Preview Interface Instruction... 6 2.3 Preview Image... 7 Chapter 3 Playback...
More informationTransport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
More informationMultimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
More informationKünftige Cyber-Attacken: Risiken und Techniken. Future Cyber attacks: Risks and techniques. Prof. Dr. T. Nouri Taoufik.Nouri@FHNW.CH. sd&m 16.09.
Künftige Cyber-Attacken: Risiken und Techniken Future Cyber attacks: Risks and techniques Prof. Dr. T. Nouri Taoufik.Nouri@FHNW.CH sd&m 16.09.08 Content 1. Hacking Techniques 2. Main Goals of IT-security
More informationMXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.
MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
($Billion Dollars) Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com
More informationSample Project List. Software Reverse Engineering
Sample Project List Software Reverse Engineering Automotive Computing Electronic power steering Embedded flash memory Inkjet printer software Laptop computers Laptop computers PC application software Software
More information2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
More informationSoftware, Shareware and Opensource CSCU9B2
Software, Shareware and Opensource CSCU9B2 1 Contents Commercial software vs Freeware vs Open Source software Licences GNU GPL Open source Common software examples Sources, Safety and Risks 2 Pay, Try,
More informationBeyond Cryptographic Conditional Access
THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the USENIX Workshop on Smartcard Technology Chicago, Illinois, USA, May 10 11, 1999 Beyond Cryptographic Conditional
More informationClient Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
More informationEncryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1
Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can
More informationWeb Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa
More informationSecurity vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
More informationSafeNet Authentication Service
SafeNet Authentication Service All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to
More informationSubject: Computers & Electronic Records. Responsible Party: Part C Coordinator
POLICIES AND PROCEDURES NEW JERSEY EARLY INTERVENTION SYSTEM No: NJEIS-17 Subject: Computers & Electronic Records Effective Date: May 1, 2011 Responsible Party: Part C Coordinator I. Purpose To protect
More informationFRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY
FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY Effective August 24, 2004 Overview: The Fresno County Employees Retirement Association (FCERA) provides access to the Internet
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationNetwork Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
More informationSECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
More informationBroadcasting encryption or systematic #FAIL? Phil
WE 201 EK 2 42 Broadcasting encryption or systematic #FAIL? SUMMARY Intro : Broadcasting something... 1984 : Discret 11 1995 : Syster 1996 2002 : Seca 1 2002 2008 : Seca 2 Conclusion 2/49 Broadcasting
More informationDigital Rights Management. Introduction
Digital Rights Management 12/1/2010 Digital Rights Management 1 Introduction Digital Rights Management (DRM) is a term used for systems that restrict the use of digital media DRM defends against the illegal
More informationMultimedia Networking and Network Security
CMPT371 12-1 Multimedia Networking and Network Security 1 Multimedia Networking and Network Security This note is based on Chapters 7 and 8 of the text book. Outline of multimedia networking Multimedia
More informationDigital Rights Management
Digital Rights Management Hubris, history, hacks. Yan Shoshitaishvili UCSB Seclab Overview Content Duplication Digital Rights Media - History Media-specific DRM MovieStealer Design Optimizations Countermeasures
More informationAn Embedded Based Web Server Using ARM 9 with SMS Alert System
An Embedded Based Web Server Using ARM 9 with SMS Alert System K. Subbulakshmi 1 Asst. Professor, Bharath University, Chennai-600073, India 1 ABSTRACT: The aim of our project is to develop embedded network
More informationChapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
More informationMontgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy
Montgomery College Course Designator/Course Number: CS 11 Course Title: Computer Literacy Course Length: 3 credits 3 5-minute meetings per week or equivalent Course Description: An introduction to the
More informationMicrosoft Smooth Streaming
Microsoft Smooth Streaming for SelenioFlex Ingest August 2015 for SelenioFlex Ingest Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers
More informationWithout prejudice to the generality of the foregoing paragraph, The Gallery Tattoo Studio does not warrant that:
WEBSITE DISCLAIMER No warranties This website is provided as is without any representations or warranties, express or implied. The Gallery Tattoo Studio makes no representations or warranties in relation
More informationTor Anonymity Network & Traffic Analysis. Presented by Peter Likarish
Tor Anonymity Network & Traffic Analysis Presented by Peter Likarish This is NOT the presenter s original work. This talk reviews: Tor: The Second Generation Onion Router Dingledine, Mathewson, Syverson
More informationREGION 19 HEAD START. Acceptable Use Policy
REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions
More informationOWASP Mobile Top Ten 2014 Meet the New Addition
OWASP Mobile Top Ten 2014 Meet the New Addition Agenda OWASP Mobile Top Ten 2014 Lack of Binary Protections added Why is Binary Protection important? What Risks Need to be Mitigated? Where to Go For Further
More informationADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015
ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD Olivier THOMAS Blackhat USA 2015 About Texplained Texplained [Technology Explained] refers
More informationPRIVACY POLICY. I. Introduction. II. Information We Collect
PRIVACY POLICY school2life, Inc. ( school2life ) Privacy Policy is designed to provide clarity about the information we collect and how we use it to provide a better social gaming experience. By accepting
More informationDigital Audio and Video Data
Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each
More informationSecurity and the Mitel Teleworker Solution
Security and the Mitel Teleworker Solution White Paper July 2007 Copyright Copyright 2007 Mitel Networks Corporation. This document is unpublished and the following notice is affixed to protect Mitel Networks
More informationImage Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
More informationCS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014)
CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014) CSTA Website Oracle Website Oracle Contact http://csta.acm.org/curriculum/sub/k12standards.html https://academy.oracle.com/oa-web-introcs-curriculum.html
More informationWhite Paper Instant Messaging (IM) and Sarbanes Oxley Compliance
White Paper Instant Messaging (IM) and Sarbanes Oxley Compliance - 1 - Statement of Purpose This document is focused on providing financial companies, and all others bound by Sarbanes-Oxley regulations,
More informationUser's Manual. iphone Codec. for SelenioFlex Ingest
iphone Codec for SelenioFlex Ingest August 2015 for SelenioFlex Ingest Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document
More informationInternet Explorer 11 Flash Install on Win7
Internet Explorer 11 Flash Install on Win7 How to Install Flash on Internet Explorer 11 on Win7 What is Adobe Flash Player (Also known as Shockwave Flash in Internet Explorer) Is freeware (Free to use)
More informationIIS Media Services 3.0 Overview. Microsoft Corporation
IIS Media Services 3.0 Overview Microsoft Corporation April 2010 Contents Contents...2 Introduction...4 IIS Media Services 3.0...4 Media Delivery Approaches Supported by Windows Server 2008 R2... 5 Goals
More informationE-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
More informationComparison of Enterprise Digital Rights Management systems
Comparison of Enterprise Digital Rights Management systems M.H. van Beek Master Thesis Computer Science MT Advice report Aia Software Thesis number 565 June 22, 2007 Radboud University Nijmegen Computer
More informationSecure Streaming Media and Digital Rights Management
Secure Streaming Media and Digital Rights Management Deepali Holankar Department of Computer Science San Jose State University San Jose, CA 95192 dbrahmbhatt@pacbell.net Mark Stamp Department of Computer
More informationIntroduction to open source software
Introduction to open source software Sebastian Rahtz OSS Watch May 2005, Timor Leste Sebastian Rahtz (OSS Watch) Introduction to open source software May 2005, Timor Leste 1 / 20 Welcome I am Sebastian
More informationDigital Video Broadcasting Conditional Access Architecture
Digital Video Broadcasting Conditional Access Architecture Introduction Digital Video Broadcasting (DVB) is a standard defining a one-to-many unidirectional data network for sending digital TV programs
More informationPeer-to-peer networking. Jupiter Research
Jarkko Niittylahti: Outline Peer-to-peer networking Network security issues Network overloading Compare: Distributed Denial of Service attack Congestion Solving problems due to P2P Fair bandwidth sharing
More informationWhat is Software Watermarking? Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks
hat is Software atermarking? Software atermarking Through Register Allocation: Implementation, Analysis, and Attacks Ginger Myles Christian Collberg {mylesg,collberg}@cs.arizona.edu University of Arizona
More informationOverview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
More informationEvolutionism of Intrusion Detection
Evolutionism of Intrusion Detection Jackie Lai The network technology changes with each passing day; and the attack technique of hacker also weeds through the old to bring forth the new. Worms such as
More informationGeneral Content Security & Service Implementation
SCHEDULE C [VOD-EST-PAYTV] CONTENT PROTECTION REQUIREMENTS AND OBLIGATIONS This Schedule C is attached to and a part of that certain [ Agreement, dated (the Agreement ), between/among ]. All defined terms
More informationSecurity from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
More information