Title: Trust
1Trust Digital Rights Management
- DIEHL Eric
- Security Technology Director
- CESAR 2008, 5 December
2Trust
Trust No One
3Outline
- Trust your model
- Trust your implementation
- Trust the greed
4Trust your model
5Trust model
OpenSSL
Alice
Bob
Eve
6Trust model for DRM
DRM
Alice
Bob
Eve
7What does it mean?
- Worst scenario!
- The attacker fully controls the host
- This is also true in game consoles
- Secure coding techniques
- Will TPM bring some help?
- Law 1 Attackers will always find their way
- Is Open source DRM possible?
- C2C
- Trusted partners
8Trust model for a new breed DRM
Clear content DRM
Alice
Bob
Authority
9What does it mean?
- Serious privacy issue
- Monitor what you watch
- Till to proof the business viability
10Real world model
Alice
Bob
Ruth
Eve
11Trust your implementation
12Compliance Robustness Regimes
Trust model
What do we trust
Compliance rules
What does it have to do
Robustness rules
What does it have to resist
Means for compliance
How we force it to comply
13Tools?
- Secure implementations
- How to test them?
- Basic tools for testing typical exploits
- Key management, side channel attacks, buffer
overflow - Robustness
- How to resist to attacks?
- Does it respect the trust model?
- Does it respect the robustness rules?
14Trust the greed
15Economic incentives
- Some failures
- AACS and PowerDVD
- Selling hardware and not content
- Align incentives!
- The entity that implements security must suffer
from eventual loss.
16How to solve?
- Study the economics
- Return On Investment
- Return On Non Loss
- Take into account psychology
- Prospect Theory
- Use game theory
- Adjust parameters or scenarii to get win-win Nash
equilibrium - Adjust business models correspondingly
17An example DRM and game theory
DRM
Pay
No DRM
Steal
18Conclusions
- Trust is paramount for DRM
- Suitable Trust Model
- Trust of implementation
- Fields of research
- Trust model for attacker owned platform
- Tools to check implementation
- Use economics and psychology in design of global
system
19Thank you for your attention
This document is for background informational
purposes only. Some points may, for example, be
simplified. No guarantees, implied or otherwise,
are intended