SLIDE 20 Conclusion
20
Data Hiding Algorithm Hiding Anti-Tampering Remote Attestation Renewability
SafeNet uc Gemalto uc Nagravision uc Protected SafeNet uc Protected Gemalto uc Protected Nagrav. uc
Software Protection Tool Flow
3
Participants
- Professional penetration testers working for security companies
- Routinely involved for security assessment of company’s products
- Profiles:
– Hackers with substantial experience in the field – Fluent with state of the art tools (reverse engineering, static analysis, debugging, profiling, tracing, …) – Able to customize existing tools, to develop plug-ins for them, and to develop their own custom tools
6
Discussion
- New protections should inhibit program analysis and reverse engineering
– Protections should exploit known limitations of advanced program analysis techniques (symbolic execution, constraint solvers, …) – What is the manual intervention needed to complete partial tool results? (controlled experiments)
- Effectiveness of protections should be tested against features available at
existing tools
– Not just theoretically of using metrics
- Protections should be selected and combined by estimated (perceived)
attack effort
Code protection tools Code analysis tools