Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011


Published on

Irdeto Spokesman Yuan Xiang Gu, Co-Founder & Chief Architect of Cloakware and Senior Director of Cloakware Advanced Research Center Speaks At ISI SSP Beijing 2011

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Apply our multi layer security to protect the Digital Asset better than any oneApply our Diversity to mitigateApply our renewability to updatesSLM , which is the category that ActiveTrust addresses is: A more dynamic model than traditional security modelsAssumes that the protection can be updated in the fieldAssumes that given enough investment by hackers, a protection solution will be crackedIt is gaining acceptance …Security requirements imposed by Studios mirror thisSome CW customers have partially implemented content protection schemes that reflect thisIt’s readily accepted when presented to prospects, influencers and owners/custodians of DA’sThis is similar to what we do in PAY-TV to protect the business model of our customers, in this case operators. In that case, we use:Smartcard or Cloaked CA, Flexi Flash technology for renewability,And Offer security services to protect our customersIn this case, we apply different technologies and protect different assets and business models but in the same manner.
  • Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011

    1. 1. 1<br />
    2. 2. Software Protection Is Becoming Mainstream<br />Yuan Xiang Gu<br />Irdeto, Canada<br />
    3. 3. About Irdeto<br />Founded in 1969 by Ir. Pieter den Toonder<br />1000 employees, over 500 customers<br />Dual headquarters: Amsterdam and Beijing<br />25 offices around the world<br />Part of Naspers, multinational media company <br />10.000 employees<br />USD $3.7B revenue in FY10<br />Pay TV Solutions (CA, Middleware, Billing)<br />Enable Broadcasters to become “Broadbanders”<br />Content Management & Distribution for Any Screen<br />Security Lifecycle Management for Any DeviceOver 3 billion software instances protected<br />
    4. 4. Un-Trusted Environment Reality <br />4<br />Cloud Computing <br />Environments<br />Un-trusted environments <br />are everywhere and even becoming more dominated in digital world<br />Persistent Security on <br />un-trusted environments <br />is becoming <br />#1 concern<br />Public Internet<br />Consumer Devices & Home Networks & Internet of Things<br />
    5. 5. New Challenges to Traditional Security<br />5<br />White-Box Security<br />Dynamic Security<br />Security of Un-Trusted Environment <br />
    6. 6. Traditional Attacks<br />Black Box Attack<br />Grey Box Attack<br />Man-In-The-Middle Attack (Indirect)<br />Bob<br />Alice<br />Network<br />Software<br />Software<br />Trusted Inside Box<br />6<br />
    7. 7. White-Box Attacks<br />Man-At-The-End Attack<br />Bob is the Attacker<br />Alice<br />Software<br />7<br />Network<br />Software<br />
    8. 8. Just Like Security and Protection in Museum<br />8<br />Beijing’s Forbidden City <br />suffers break-in <br />Beijing’s Forbidden City <br />Robbed, May 11, 2011<br />
    9. 9. Static Security vs Dynamic Security<br />Dynamic Security<br />Static Security<br /> Once static security breaks, the entire security is gone and hard to be restored<br />Once dynamic security breaks, the security can be renewed and restored immediately in a planned way<br />9<br />
    10. 10. Fundamental to Digital Asset Protection<br />Tampering<br />Analysis<br />Data Flow Transforms<br />Control Flow <br />Transforms<br />Dynamic Integrity Verification<br />White Box Crypto<br />Stage 1a. Implement Attack Resistance<br />Protect Digital Assets through fundamental enabling software security and services through the lifecycle <br />Dynamic Code<br />Decryption<br />Dynamic Code <br />Decryption<br />Core Technology Defenses<br />Stage 2. Monitor & Analyze Hacker Progress<br />Stage 3. Deploy Counter-measures<br />Stage 4. Respond to Attacks<br />Stage 5. Renew Security <br />Anti-Debug<br /> Stage 1b. Implement Attack Mitigation<br />Software Diversity<br />Software Diversity<br />Attack<br />Automation<br />Attack<br />Distribution<br />Software<br />Renewability<br />Software<br />Renewability<br />Lifecycle<br /> Security<br />Digital AssetProtection <br />Protected Digital Asset Distributed and Consumed<br />10<br />
    11. 11. Irdeto Technology Protects Beyond Media<br />11<br />Multi-Media<br /><ul><li> Video
    12. 12. Film
    13. 13. TV</li></ul>Games<br />E-Maps<br />E-Publications<br /><ul><li> E-Book
    14. 14. E-Magazine
    15. 15. E-Journal</li></ul>Cloud Computing<br />Smarter Metering<br />Applications<br /><ul><li> Native App
    16. 16. Scripted App
    17. 17. Network App</li></ul>Any digitalized assets to be protected<br />
    18. 18. Questions?<br />Thank You!<br />
    19. 19.<br />