Trust - PowerPoint PPT Presentation

1 / 19
About This Presentation
Title:

Trust

Description:

Alice. Bob. Eve. DRM. 7. What does it mean? Worst scenario! The attacker fully controls the host ... Alice. Bob. Eve. Ruth. Trust your implementation. 12 ... – PowerPoint PPT presentation

Number of Views:63
Avg rating:3.0/5.0
Slides: 20
Provided by: die79
Category:
Tags: alice | eve | trust

less

Transcript and Presenter's Notes

Title: Trust


1
Trust Digital Rights Management
  • DIEHL Eric
  • Security Technology Director
  • CESAR 2008, 5 December

2
Trust
Trust No One
3
Outline
  • Trust your model
  • Trust your implementation
  • Trust the greed

4
Trust your model
5
Trust model
OpenSSL
Alice
Bob
Eve
6
Trust model for DRM
DRM
Alice
Bob
Eve
7
What does it mean?
  • Worst scenario!
  • The attacker fully controls the host
  • This is also true in game consoles
  • Secure coding techniques
  • Will TPM bring some help?
  • Law 1 Attackers will always find their way
  • Is Open source DRM possible?
  • C2C
  • Trusted partners

8
Trust model for a new breed DRM
Clear content DRM
Alice
Bob
Authority
9
What does it mean?
  • Serious privacy issue
  • Monitor what you watch
  • Till to proof the business viability

10
Real world model
Alice
Bob
Ruth
Eve
11
Trust your implementation
12
Compliance Robustness Regimes
Trust model
What do we trust
Compliance rules
What does it have to do
Robustness rules
What does it have to resist
Means for compliance
How we force it to comply
13
Tools?
  • Secure implementations
  • How to test them?
  • Basic tools for testing typical exploits
  • Key management, side channel attacks, buffer
    overflow
  • Robustness
  • How to resist to attacks?
  • Does it respect the trust model?
  • Does it respect the robustness rules?

14
Trust the greed
15
Economic incentives
  • Some failures
  • AACS and PowerDVD
  • Selling hardware and not content
  • Align incentives!
  • The entity that implements security must suffer
    from eventual loss.

16
How to solve?
  • Study the economics
  • Return On Investment
  • Return On Non Loss
  • Take into account psychology
  • Prospect Theory
  • Use game theory
  • Adjust parameters or scenarii to get win-win Nash
    equilibrium
  • Adjust business models correspondingly

17
An example DRM and game theory
DRM
Pay
No DRM
Steal
18
Conclusions
  • Trust is paramount for DRM
  • Suitable Trust Model
  • Trust of implementation
  • Fields of research
  • Trust model for attacker owned platform
  • Tools to check implementation
  • Use economics and psychology in design of global
    system

19
Thank you for your attention
This document is for background informational
purposes only. Some points may, for example, be
simplified. No guarantees, implied or otherwise,
are intended
Write a Comment
User Comments (0)
About PowerShow.com