Software Piracy Overview of Anti-Tampering Technologies. Scott Baeder Sr. Architect Cadence Design Systems baeder@cadence.



Similar documents
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

FLOATING LICENSE MANAGEMENT

Lecture 12: Software protection techniques. Software piracy protection Protection against reverse engineering of software

Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator

What is Really Needed to Secure the Internet of Things?

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop Presented by An In seok

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Industry 4.0: Cyber-Security Challenges on the Horizon

Secure Data Exchange Solution

OMAP platform security features

OWASP Mobile Top Ten 2014 Meet the New Addition

ADVANCE AUTHENTICATION TECHNIQUES

The Top Web Application Attacks: Are you vulnerable?

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base

Licensing.nuance.com User Guide

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

General Content Security & Service Implementation

Digital Rights Management. Introduction

The Roles of Software Testing & QA in Security Testing

True Identity solution

BYOD AND NEXT- GENERATION MOBILE SECURITY

M-Shield mobile security technology

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

Cisco Trust Anchor Technologies

Software Hardware Binding with Quiddikey

CHAPTER 10: COMPUTER SECURITY AND RISKS

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

Digital Signatures on iqmis User Access Request Form

Best Practices In Software Monetization A Customer Perspective

Pervasive Computing und. Informationssicherheit

SoftwareFileProtection.com. File Encryption System Using USB Dongles. User Guide For Mac

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

That Point of Sale is a PoS

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Advanced Authentication

Secure IP Address Management Layer 2 Network Access Control Solution

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

e-code Academy Information Security Diploma Training Discerption

How Managed File Transfer Addresses HIPAA Requirements for ephi

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting

Hardware Security Modules for Protecting Embedded Systems

Advanced Authentication Methods Determining the Best Fit for Your Agency. Strong Authentication. Simplified.

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Embedded Java & Secure Element for high security in IoT systems

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon

Lightweight Security using Identity-Based Encryption Guido Appenzeller

Secure USB Flash Drive. Biometric & Professional Drives

Threat Modeling in the Gaming Industry. Robert Wood Technical Manager

AEL Data Services LLP. LEKTZ - Digital Rights Management (DRM) Solutions

CryptoFirewall Technology Introduction

AGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Enterprise Network Deployment, 10,000 25,000 Users

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

W ith an estimated 14 billion devices connected to

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

SCADA SYSTEMS AND SECURITY WHITEPAPER

The What, Why, and How of Authentication

Protect, License and Sell Xojo Apps

IQware's Approach to Software and IT security Issues

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5

Digital identity: Toward more convenient, more secure online authentication

Critical Controls for Cyber Security.

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Research on Situation and Key Issues of Smart Mobile Terminal Security

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus

Chapter 1: Introduction

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

DAS (Direct Attached Storage)

Practice test Domain-2 Security (Brought to you by RMRoberts.com)

Multi-Factor Authentication

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Transcription:

Software Piracy Overview of Anti-Tampering Technologies Scott Baeder Sr. Architect Cadence Design Systems baeder@cadence.com 0

Agenda Quick Review of Piracy Binary Hacking Crackers Workflow First Impressions Requirements Next Steps Contact Information 1

Quick Review of Piracy Three basic forms of Piracy Counterfeit keys» (make your own keys) HostID spoofing» (clone the server) Binary hacking» (modify the executable to remove licensing checks) 2

Counterfeit Keys This is the easiest because the FLEXlm key generation algorithm was cracked way back in V6.x http://www.woodmann.com/crackz/index.html FLEXlm added increased encryption Tamper resistant licensing (TRL)» Licensed from Certicom To my knowledge no one has completely cracked ECC algorithm and generated counterfeit TRL enabled keys 3

Tamper Resistant Licensing TRL is not a part of the basic licensing package from Macrovision. Everyone in the space should move to implement this in their licensing systems. BUT, the quality of the result depends on the implementation! 4

HostID Spoofing A HostID is the unique identifier used to lock a license file to a server. Can be a dongle or other HW based identifier Very easy to spoof (clone) PC hardware IDs Home routers can clone an Ethernet HW identifier (MAC address) Commonly used ID on Linux and Windows based PC hardware FLEXlm option to increase security of hostid called Tamper resistant binding (TRB) 5

Tamper Resistant Binding Can use additional items to create a stronger hostid Can be supplied by vendor Can also make use of trusted storage Some forms of this now included in the basic packaging from Macrovision As with TRL, quality of results when using TRB depend on the implementation 6

Binary hacking Process of modifying the executable to remove or bypass licensing checks Has been the method of choice in the PC Software space. Now that we are closing off the easy ways to steal software, more attention needs to be placed here. 7

Binary hacking Preventing binary hacking is a very young field related to DRM (Digital Rights Management) C has had discussion with three major players (so far), plus a few other related companies Some came from PC Game industry, others from protecting Military Software, etc. 8

Cracker s Workflow DONE Run a tool to determine which copy protection is used Note where and step over Hit Hit antidebug Run tool(s) to remove protection Load application Start debugger Step through header and remove protection code Develop tool to remove protection automatically Determine where and remove protection or alter code Crash or malfunction Step through application Find starting point of application DONE 9

Multiple Technologies Are Necessary To Provide Truly Effective Protection Maximize the work effort to remove licensing Variety of protection installed in Thousands of places in the code Impede reverse engineering and automated licensing removal Use anti-disassembler & anti-debug technologies Use encryption, obfuscation, spoofing and authentication Maximize user friendliness 10

An example (taken from a vendor web site) XXXXXXXXXXXX is comprised of three components: Post Processor which is an application that automatically encrypts a software application, embeds a Secure Execution Monitor (described below), and adds pre-defined application and security extensions. Secure Execution Monitor which is a set of security functions for encrypting and decrypting application subroutines, ensuring application integrity, and monitoring the run-time environment for malicious activity and unauthorized access. Application and Security Extensions which are custom extensions that support software authorization frameworks, enhanced security through the integration of external key management devices/systems, and alternate encryption algorithms. 11

First Impressions Today, all are PC/Windows based, but moving into Linux and other platforms. But unless we cover all platforms, the crackers will just move to the ones that are unprotected. Some only protect.exe's and not shared libraries Some originally viewed their own technology as copy protection BUT anti-tampering technologies are similar. 12

First Impressions Macrovision has trusted storage, but no one has really evaluated it yet. To be really safe you probably need to install guards into the source code which requires modifying application Tools that protect the Militaries embedded software (smart bomb control software, etc.) is the most comprehensive (and the most expensive) 13

First Impressions Some use exotic means. For example, one uses imperfections All hard drives have highly unique damage areas Same for the silicon in CPUs, RAM, Video Chips etc. Generate a Device Fingerprint by using over 10,000 non-user-configurable samples from a typical PC Bottom line no Silver Bullet (yet) 14

Requirements A comprehensive solution that covers secure hostid, anti-tampering and reverse engineering protection. Want a solution that works as part of the backend process without source code changes even though that offers the best protection and could eventually be required. 15

Requirements Doesn t rely on any phone home mechanisims So far, all the vendors we have talked to only cover part of the solution but any of them may be an important part of a comprehensive solution. 16

Next Steps C s Anti-Piracy committee will continue to follow trends Some of us are already engaged in evaluations and trial deployments If you want more information on what we are doing (and your company is an C member), contact me to get involved. 17

Contact Information Scott Baeder baeder@cadence.com 18