1<br />
Software Protection Is Becoming Mainstream<br />Yuan Xiang Gu<br />Irdeto, Canada<br />
About Irdeto<br />Founded in 1969 by Ir. Pieter den Toonder<br />1000 employees, over 500 customers<br />Dual headquarters...
Un-Trusted Environment Reality <br />4<br />Cloud Computing <br />Environments<br />Un-trusted environments <br />are ever...
New Challenges to Traditional Security<br />5<br />White-Box Security<br />Dynamic Security<br />Security of Un-Trusted En...
Traditional Attacks<br />Black Box Attack<br />Grey Box Attack<br />Man-In-The-Middle Attack (Indirect)<br />Bob<br />Alic...
White-Box Attacks<br />Man-At-The-End Attack<br />Bob is the Attacker<br />Alice<br />Software<br />7<br />Network<br />So...
Just Like Security and Protection in Museum<br />8<br />Beijing’s Forbidden City <br />suffers break-in <br />Beijing’s Fo...
Static Security vs Dynamic Security<br />Dynamic Security<br />Static Security<br />	Once static security breaks, the enti...
Fundamental to Digital Asset Protection<br />Tampering<br />Analysis<br />Data Flow Transforms<br />Control Flow <br />Tra...
Irdeto Technology Protects Beyond Media<br />11<br />Multi-Media<br /><ul><li> Video
 Film
 TV</li></ul>Games<br />E-Maps<br />E-Publications<br /><ul><li>   E-Book
Upcoming SlideShare
Loading in...5
×

Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011

991

Published on

Irdeto Spokesman Yuan Xiang Gu, Co-Founder & Chief Architect of Cloakware and Senior Director of Cloakware Advanced Research Center Speaks At ISI SSP Beijing 2011

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
991
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Apply our multi layer security to protect the Digital Asset better than any oneApply our Diversity to mitigateApply our renewability to updatesSLM , which is the category that ActiveTrust addresses is: A more dynamic model than traditional security modelsAssumes that the protection can be updated in the fieldAssumes that given enough investment by hackers, a protection solution will be crackedIt is gaining acceptance …Security requirements imposed by Studios mirror thisSome CW customers have partially implemented content protection schemes that reflect thisIt’s readily accepted when presented to prospects, influencers and owners/custodians of DA’sThis is similar to what we do in PAY-TV to protect the business model of our customers, in this case operators. In that case, we use:Smartcard or Cloaked CA, Flexi Flash technology for renewability,And Offer security services to protect our customersIn this case, we apply different technologies and protect different assets and business models but in the same manner.
  • Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011

    1. 1. 1<br />
    2. 2. Software Protection Is Becoming Mainstream<br />Yuan Xiang Gu<br />Irdeto, Canada<br />
    3. 3. About Irdeto<br />Founded in 1969 by Ir. Pieter den Toonder<br />1000 employees, over 500 customers<br />Dual headquarters: Amsterdam and Beijing<br />25 offices around the world<br />Part of Naspers, multinational media company <br />10.000 employees<br />USD $3.7B revenue in FY10<br />Pay TV Solutions (CA, Middleware, Billing)<br />Enable Broadcasters to become “Broadbanders”<br />Content Management & Distribution for Any Screen<br />Security Lifecycle Management for Any DeviceOver 3 billion software instances protected<br />
    4. 4. Un-Trusted Environment Reality <br />4<br />Cloud Computing <br />Environments<br />Un-trusted environments <br />are everywhere and even becoming more dominated in digital world<br />Persistent Security on <br />un-trusted environments <br />is becoming <br />#1 concern<br />Public Internet<br />Consumer Devices & Home Networks & Internet of Things<br />
    5. 5. New Challenges to Traditional Security<br />5<br />White-Box Security<br />Dynamic Security<br />Security of Un-Trusted Environment <br />
    6. 6. Traditional Attacks<br />Black Box Attack<br />Grey Box Attack<br />Man-In-The-Middle Attack (Indirect)<br />Bob<br />Alice<br />Network<br />Software<br />Software<br />Trusted Inside Box<br />6<br />
    7. 7. White-Box Attacks<br />Man-At-The-End Attack<br />Bob is the Attacker<br />Alice<br />Software<br />7<br />Network<br />Software<br />
    8. 8. Just Like Security and Protection in Museum<br />8<br />Beijing’s Forbidden City <br />suffers break-in <br />Beijing’s Forbidden City <br />Robbed, May 11, 2011<br />
    9. 9. Static Security vs Dynamic Security<br />Dynamic Security<br />Static Security<br /> Once static security breaks, the entire security is gone and hard to be restored<br />Once dynamic security breaks, the security can be renewed and restored immediately in a planned way<br />9<br />
    10. 10. Fundamental to Digital Asset Protection<br />Tampering<br />Analysis<br />Data Flow Transforms<br />Control Flow <br />Transforms<br />Dynamic Integrity Verification<br />White Box Crypto<br />Stage 1a. Implement Attack Resistance<br />Protect Digital Assets through fundamental enabling software security and services through the lifecycle <br />Dynamic Code<br />Decryption<br />Dynamic Code <br />Decryption<br />Core Technology Defenses<br />Stage 2. Monitor & Analyze Hacker Progress<br />Stage 3. Deploy Counter-measures<br />Stage 4. Respond to Attacks<br />Stage 5. Renew Security <br />Anti-Debug<br /> Stage 1b. Implement Attack Mitigation<br />Software Diversity<br />Software Diversity<br />Attack<br />Automation<br />Attack<br />Distribution<br />Software<br />Renewability<br />Software<br />Renewability<br />Lifecycle<br /> Security<br />Digital AssetProtection <br />Protected Digital Asset Distributed and Consumed<br />10<br />
    11. 11. Irdeto Technology Protects Beyond Media<br />11<br />Multi-Media<br /><ul><li> Video
    12. 12. Film
    13. 13. TV</li></ul>Games<br />E-Maps<br />E-Publications<br /><ul><li> E-Book
    14. 14. E-Magazine
    15. 15. E-Journal</li></ul>Cloud Computing<br />Smarter Metering<br />Applications<br /><ul><li> Native App
    16. 16. Scripted App
    17. 17. Network App</li></ul>Any digitalized assets to be protected<br />
    18. 18. Questions?<br />Thank You!<br />
    19. 19. www.irdeto.com<br />
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×