1
Software Protection Is Becoming Mainstream
Yuan Xiang GuIrdeto, Canada
About Irdeto
Founded in 1969 by Ir. Pieter den Toonder
1000 employees, over 500 customers
Dual headquarters: Amsterdam and Beijing 25 offices around the world
Part of Naspers, multinational media company 10.000 employees USD $3.7B revenue in FY10
Pay TV Solutions (CA, Middleware, Billing) Enable Broadcasters to become “Broadbanders”
Content Management & Distribution for Any Screen Security Lifecycle Management for Any Device
Over 3 billion software instances protected
Un-Trusted Environment Reality
4
Cloud Computing Environments
Consumer Devices & Home Networks & Internet of Things
Public Internet
Un-trusted environments are everywhere
and even becoming more
dominated in digital world
Persistent Security on un-trusted
environments is becoming #1 concern
New Challenges to Traditional Security
5
White-Box Security
Dynamic Security
Security of Un-Trusted Environment
Traditional Attacks
Bob
Black Box AttackGrey Box Attack
Alice
Software Software
Network
Trusted Inside Box
6
Man-In-The-Middle Attack (Indirect)
White-Box Attacks
Bob is the Attacker
Software
7
Network
Alice
Software
Man-At-The-End Attack
Just Like Security and Protection in Museum
8
Beijing’s Forbidden City suffers break-in
Beijing’s Forbidden City Robbed, May 11, 2011
Static Security vs Dynamic Security
Once static security breaks, the entire security is gone and hard to be restored
Static Security Dynamic Security
9
Once dynamic security breaks, the security can be renewed and restored immediately in a planned way
Fundamental to Digital Asset Protection
10
Protect Digital Assets through fundamental
enabling software security and services through the lifecycle
Stage 1a. Implement
Attack Resistance
Stage 2. Monitor &
Analyze Hacker Progress
Stage 1b. Implement
Attack Mitigation
Stage 3. Deploy
Counter-measures
Stage 4. Respond to
Attacks
Stage 5. Renew
Security
Protected Digital Asset Distributed and Consumed
Lifecycle Security
Digital AssetProtection
Tampering
AttackAutomation
Analysis
AttackDistribution
Software Diversity
Software Diversity
SoftwareRenewability
SoftwareRenewability
Core Technology Defenses
Data Flow Transforms
Anti-Debug
White Box CryptoDynamic Code
Decryption
Control Flow Transforms
Dynamic Integrity Verification
Dynamic Code Decryption
Irdeto Technology Protects Beyond Media
11
Multi-Media• Video• Film• TV
Applications• Native App• Scripted
App• Network
App
Games E-Maps
E-Publications• E-Book• E-
Magazine• E-Journal
Smarter Metering
Cloud Computing
Any digitalized assets to be protected
Questions?
Thank You!
www.irdeto.com