Você está na página 1de 3

wd612_YW_f2.

qxd 12/5/2006 2:41 PM Page 32

32  A YEAR IN WIRELESS  D E C E M B E R 2 00 6  WWW.W I R E LE S S D E S I G N M A G.C O M

A Foundation for
Secure Mobile DRM
Embedded Security
 The inherent weakness
D
igital Rights Management result, anti-virus and other malware
(DRM) is a compelling reason prevention tools are necessary to
of software-only solutions to enhance security of mobile safely use such desktop operating
phones against attacks by the systems.
is one of the most phone holder. DRM systems allow Symbian OS v9, the latest version
content owners to specify and con- of an advanced open mobile operat-
important factors limiting trol the usage policy for their con- ing system, is a major enhancement
tent; such systems are crucial for that aims to significantly enhance pro-
DRM-based distribution the entertainment industry and for tection against malicious code and
secure information handling in cor- social engineering attacks. In general,
of premium content.
porate environments. only verified applications from known
 By Craig Heath & Alexander Klimov Modern Smartphone’s have more sources are allowed to access pro-
memory and computing power than tected resources, although the user
the desktop computers of the not-so- may also grant some limited privi-
distant past ⎯ though they have yet leges. Even if a message containing
to experience the same scale of secu- malware tricks the user into installing
Symbian family rity problems seen in the desktop that malware, its privileges are
of phones.
world. The lack of security-centered restricted so that it is not able to
design in the most widely-deployed compromise the entire system.
desktop operating systems has Yet several DRM systems have
severe consequences: a freshly come into use that do not provide
installed system can be compromised protection against a well-motivated
well before the attacker. At least one well-known
user has time to DRM system is widely used, despite
download the the fact that step-by-step tutorials
latest security and special software that removes
patches. As a the DRM protection are readily
available from the Internet.
Every widely-used DRM sys-
tem that relies only on software
suffers from the same weakness.
Using cryptography, the system
can protect content from users who
should not be permitted to access the
content at all; however, experience
shows that it is impractical to build
a software-only system that allows a
limited number of legal accesses, but
effectively prevents subsequent illegal
accesses. This inherent weakness of
software-only solutions is one of the
wd612_YW_f2.qxd 12/4/2006 2:51 PM Page 33

W W W.W I R E LE S S D E S I G N M A G.C O M M 씰 D E C E M B E R 2 00 6 33

Trust and Confidence Applications

Symbian CAF
Rights and Responsibilities Assurance
DRM Schemes

Symbian Plat Sec


Confidentiality Integrity Authorization Availability

Trusted Computing Base


Middleware Interface Layer

Identification Authentication Access Control Audit Object Reuse Security Device Driver
Key Management Certificate Management
Encryption Certficates Biometrics Reference Logging etc. . .
Monitor Cryptographic Schemes Secure Storage
Secure
Hardware Abstraction Layer Storage
Symbian’s view of mobile security as a holistic property. Database

Secure CryptoCell HW
Boot Secret CryptoKey PRNG PKA AES/DES Engines Hash Engines
most important factors limiting DRM- Symbian Platform
Discretix Proprietary and Confidential
based distribution of premium content. Security1 Overview
The situation is similar to low-tech Each applica- DiscretixDRM Security Architecture for
newspaper vending machines that tion executed by Symbian OS v9 Symbian 9.x.
consist of a stack of newspapers may have some capabilities associ-
and a box with a slot for coins. ated with it. To access a protected write access to the private directo-
There are some dishonest cus- API, for example, the application ries of other processes.
tomers who take the newspaper must have the capability required by The phone’s internal file system
and do not put anything into the box this API. To send an SMS, the appli- contains a protected area (/sys/sub-
but, on average, the loss is much cation needs Network Services tree), which is only accessible to
smaller than the cost of theft-resist- capability; to access DRM-protect- applications with TCB capability.
ant vending machines. In some ed content, the application needs During installation of an application,
countries such low-tech devices are DRM capability. executables, which include their
widely deployed to sell cheap These capabilities are associated assigned capabilities, are placed
goods, but they would never be with each application during installa- into /sys/bin/. It is also possible to
used to sell expensive ones. tion of the application. There are install an application onto removable
As a newer and better OS solution, three broad classes of capabilities media ⎯ in this case, a crypto-
Symbian OS v9 enables significant considered by Symbian Signed: the graphic hash of the executable is
enhancements to software-only DRM unsigned-sandboxed set includes all stored in the internal memory and
systems. Once the operating system the capabilities which may be grant- verified on each load.
is running, it prevents unauthorized ed by the user to a non-signed The TCB, which is the OS kernel,
code from accessing DRM secrets application; the basic set of capabil- the file server and the software
and thus, malicious users cannot intro- ities is granted to all certified installer, restricts execution to files
duce a modified player that ignores Symbian Signed applications; lastly, from the internal path /sys/bin/ and
the usage policy of the content owner. selected capabilities from the those on removable media that were
Unfortunately, some attacks still extended set are granted to not altered since installation. Thus,
cannot be mitigated by a software- Symbian Signed applications if they as long as an attacker cannot alter
only solution. If an attacker has physi- undergo additional testing appropri- the content of the /sys/ subtree
cal access to the phone’s internal ate to those additional capabilities. (and the trusted code contains no
memory, then they could read the There are also capabilities which critical bugs), no malicious code will
DRM secrets or even modify software are typically not assigned to applica- be executed. Moreover, each
that was supposed to enforce the tions, but only to system software: installed application can access
access policy. It is with this situation TCB (Trusted Computing Base) only those protected APIs that it
in mind that we discuss here how to capability provides unrestricted was authorized to access.
prevent attacks even from such a access to all the hardware and soft-
sophisticated adversary with a system ware on the platform and All Files Hardware-based Security
that integrates Symbian OS v9 with capability provides read-only access The security mechanisms of
hardware-based security. to the entire file system and read- Symbian OS v9 provide strong
wd612_YW_f2.qxd 12/4/2006 2:51 PM Page 34

34 씰 A YEAR IN WIRELESS 씰 D E C E M B E R 2 00 6 씱 WWW.W I R E LE SS D E S I G N M A G.C O M M

protection against software attacks; works in detail. The secure boot not corrupted. Thus an attacker can-
however, as a software-only solution loader stored in ROM has control of not decrypt X because the key is
they cannot protect against physical the CPU immediately after the reset stored inside secure hardware and
attacks. If an attacker has the neces- of the device. The ROM also con- cannot be extracted; cannot replace
sary equipment and physical access tains a public key which is used to X with new data because it would
to the phone, they can simply over- verify signatures of all the binary corrupt the MAC; and cannot even
write the content of internal memory code of the TCB. Before loading the replace X with one of its previous
when the TCB is not even loaded. TCB, the secure boot loader calcu- values because it would corrupt the
The purpose of DRM is to enforce lates cryptographic hashes of all the MAC on the database as a whole.
the usage policy on the content TCB components and checks their If Non-Volatile Memory (NVM) is
according to the specification provid- signatures. Therefore, if an attacker available, the hardware uses it to
ed by the owner of the content and modifies any part of the TCB while store the update counter: each time
thus prevent the device user from the system is offline, they will not be the database is updated, the counter
using the content in an inappropriate able to boot the system. Note that is incremented and the new value is
manner. If the user performs an offline the work done by the secure boot- included into the database MAC cal-
attack to introduce a malicious appli- loader does not add a significant culation. Thus even if an attacker has
cation with DRM capability into the delay into the boot sequence. saved the whole database and tries
system, then they will be able to Secure boot protects the integrity to revert it to the saved state, the
defeat the DRM protection mecha- of the software executed by the NVM counter will be different and
nisms. A software-based SIM-lock, a device, but it does not protect the thus the database MAC verification
type of theft-prevention mechanism, is confidentiality of the information in the will fail. This prevents an attack, for
another application which requires secondary storage. Even if we encrypt example, where a DRM system uses
resistance to someone who has phys- all the information, we still need a play counts to enforce the policy that
ical access to the phone. Without location to store the encryption key. some particular content shall not be
such protection, a thief could modify Hardware-based secure storage pro- rendered more than a predefined
the software so that it does not check vides such a service, ensuring that the number of times, and an attacker
if the SIM card is not authorized. adversary cannot access (read or tries to reset the play counters.
One might think that this simple modify) protected information.
attack could be counteracted by the Recalling that the adversary can- Conclusion
TCB using the following strategy: not change the operating system Although the platform security
instead of relying on the integrity of because it is protected by the architecture of Symbian OS v9 pro-
the internal storage, the TCB could secure boot, let us consider how the vides protection against software
save the certificate which comes secure storage works. Suppose that attacks by malicious code, a hard-
with the software being installed secure storage hardware receives ware-based solution is also needed
and use it to check the integrity of requests from the operating system to protect against sophisticated
the software and its associated to store item X. The hardware uses attacks by someone in physical pos-
capabilities before each execution. an internal secret key to encrypt X, session of the phone. Symbian OS
Unfortunately, this additional safe- to calculate the Message v9 platform security and secure hard-
guard does not really enhance the Authentication Code (MAC) of X, ware together provide a firm founda-
security because the attacker can and to calculate the MAC of the tion for development of DRM sys-
simply overwrite the part of the sys- whole database. This information is tems which are highly secure even
tem which checks integrity of exe- then used to update secondary stor- against sophisticated adversaries.
cutables with the one which always age devoted to the secure area.
says: “the signature is correct.” When the operating system About the Authors
Using a hardware-based secure requests a specific item, it is Craig Heath is product manager,
boot mechanism, however, it is pos- decrypted and returned; however, security and Alexander Klimov is
sible to neutralize such “reflashing” before any item is read, the secure Cryptography Architect for Discretix.
attacks. Let us consider how this storage checks that the database is

Você também pode gostar