irdeto spokesman yuan xiang gu speaks at isi ssp beijing 2011
DESCRIPTION
Irdeto Spokesman Yuan Xiang Gu, Co-Founder & Chief Architect of Cloakware and Senior Director of Cloakware Advanced Research Center Speaks At ISI SSP Beijing 2011TRANSCRIPT
![Page 1: Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011](https://reader035.vdocuments.net/reader035/viewer/2022062615/547cf4bcb4af9f6b508b45ac/html5/thumbnails/1.jpg)
1
![Page 2: Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011](https://reader035.vdocuments.net/reader035/viewer/2022062615/547cf4bcb4af9f6b508b45ac/html5/thumbnails/2.jpg)
Software Protection Is Becoming Mainstream
Yuan Xiang GuIrdeto, Canada
![Page 3: Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011](https://reader035.vdocuments.net/reader035/viewer/2022062615/547cf4bcb4af9f6b508b45ac/html5/thumbnails/3.jpg)
About Irdeto
Founded in 1969 by Ir. Pieter den Toonder
1000 employees, over 500 customers
Dual headquarters: Amsterdam and Beijing 25 offices around the world
Part of Naspers, multinational media company 10.000 employees USD $3.7B revenue in FY10
Pay TV Solutions (CA, Middleware, Billing) Enable Broadcasters to become “Broadbanders”
Content Management & Distribution for Any Screen Security Lifecycle Management for Any Device
Over 3 billion software instances protected
![Page 4: Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011](https://reader035.vdocuments.net/reader035/viewer/2022062615/547cf4bcb4af9f6b508b45ac/html5/thumbnails/4.jpg)
Un-Trusted Environment Reality
4
Cloud Computing Environments
Consumer Devices & Home Networks & Internet of Things
Public Internet
Un-trusted environments are everywhere
and even becoming more
dominated in digital world
Persistent Security on un-trusted
environments is becoming #1 concern
![Page 5: Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011](https://reader035.vdocuments.net/reader035/viewer/2022062615/547cf4bcb4af9f6b508b45ac/html5/thumbnails/5.jpg)
New Challenges to Traditional Security
5
White-Box Security
Dynamic Security
Security of Un-Trusted Environment
![Page 6: Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011](https://reader035.vdocuments.net/reader035/viewer/2022062615/547cf4bcb4af9f6b508b45ac/html5/thumbnails/6.jpg)
Traditional Attacks
Bob
Black Box AttackGrey Box Attack
Alice
Software Software
Network
Trusted Inside Box
6
Man-In-The-Middle Attack (Indirect)
![Page 7: Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011](https://reader035.vdocuments.net/reader035/viewer/2022062615/547cf4bcb4af9f6b508b45ac/html5/thumbnails/7.jpg)
White-Box Attacks
Bob is the Attacker
Software
7
Network
Alice
Software
Man-At-The-End Attack
![Page 8: Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011](https://reader035.vdocuments.net/reader035/viewer/2022062615/547cf4bcb4af9f6b508b45ac/html5/thumbnails/8.jpg)
Just Like Security and Protection in Museum
8
Beijing’s Forbidden City suffers break-in
Beijing’s Forbidden City Robbed, May 11, 2011
![Page 9: Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011](https://reader035.vdocuments.net/reader035/viewer/2022062615/547cf4bcb4af9f6b508b45ac/html5/thumbnails/9.jpg)
Static Security vs Dynamic Security
Once static security breaks, the entire security is gone and hard to be restored
Static Security Dynamic Security
9
Once dynamic security breaks, the security can be renewed and restored immediately in a planned way
![Page 10: Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011](https://reader035.vdocuments.net/reader035/viewer/2022062615/547cf4bcb4af9f6b508b45ac/html5/thumbnails/10.jpg)
Fundamental to Digital Asset Protection
10
Protect Digital Assets through fundamental
enabling software security and services through the lifecycle
Stage 1a. Implement
Attack Resistance
Stage 2. Monitor &
Analyze Hacker Progress
Stage 1b. Implement
Attack Mitigation
Stage 3. Deploy
Counter-measures
Stage 4. Respond to
Attacks
Stage 5. Renew
Security
Protected Digital Asset Distributed and Consumed
Lifecycle Security
Digital AssetProtection
Tampering
AttackAutomation
Analysis
AttackDistribution
Software Diversity
Software Diversity
SoftwareRenewability
SoftwareRenewability
Core Technology Defenses
Data Flow Transforms
Anti-Debug
White Box CryptoDynamic Code
Decryption
Control Flow Transforms
Dynamic Integrity Verification
Dynamic Code Decryption
![Page 11: Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011](https://reader035.vdocuments.net/reader035/viewer/2022062615/547cf4bcb4af9f6b508b45ac/html5/thumbnails/11.jpg)
Irdeto Technology Protects Beyond Media
11
Multi-Media• Video• Film• TV
Applications• Native App• Scripted
App• Network
App
Games E-Maps
E-Publications• E-Book• E-
Magazine• E-Journal
Smarter Metering
Cloud Computing
Any digitalized assets to be protected
![Page 12: Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011](https://reader035.vdocuments.net/reader035/viewer/2022062615/547cf4bcb4af9f6b508b45ac/html5/thumbnails/12.jpg)
Questions?
Thank You!
![Page 13: Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011](https://reader035.vdocuments.net/reader035/viewer/2022062615/547cf4bcb4af9f6b508b45ac/html5/thumbnails/13.jpg)
www.irdeto.com