This disclosure relates to computer and data security, operating system security, and preventing tampering with operating and hardware timing operations.
Time is a critical component of computer enabled DRM (Digital Rights Management) systems, especially when they are implemented on top of untrusted environments (such as computer operating systems such as Microsoft Windows, Linux, Macintosh Operating System, or hardware in consumer electronic devices). Since users can fully interact with and access those systems, they are able to fake, replace, tamper, or remove some of the timing related operations performed or used by the DRM system.
Timing operations are managed by the operating system itself. User space processes (software) ask the operating system kernel (ring zero) for a time request (performing the SYS_gettimeofday system call, for instance, in the Macintosh operating system Leopard). Therefore there are many ways to return faked or tampered time indications to user space processes. These actions can be performed without modifying the targeted process virtual memory spaces using for instance API hooking or kernel patches as well known in the field. This is one of the most critical threats to the integrity of content (audio and video) rental DRM systems since one needs to ensure that time has not been modified or its rate changed (in order to pass slower for instance).
The present time tampering detection method and apparatus are dynamic and do not necessarily provide persistency to system reboots or shutdowns. On untrusted platforms, the scope of this protection may be limited to the protected running routine, which may be either a user process or a kernel routine (embedded in the operating system kernel or through a kernel extension/driver). However, it may be adapted on hardware (circuitry) to provide persistency. Adding persistency to the present method can be provided by storing the information in a secure memory. This can be done especially in “trusted” environments such as Smart cards or secured embedded devices.
In any case of time modification detection, the goal of such detection is to ensure that it is strong enough so that an attacker has to perform many modifications or workarounds in order to roll back to a normal and fully functional operating system.
Digital rights management is well known in the computer and consumer electronics field. It is typically used by content providers in order to prevent hacking or misuse of protected that is proprietary or copyrighted content such as audio or video material, such as movies, songs, etc. There are many aspects to DRM, including encryption and other techniques. The present method in one illustrative embodiment is directed to ensuring that restrictions on rental of content, such as movie rentals when delivered in the form of a digital file to the user, are maintained. Typically such on-line rentals are for limited periods of time. For instance, a typical movie rental delivered by an online (Internet) website is for a total duration of 30 days during which the movie can only be viewed for a particular 24 hour time window. However it is anticipated that hackers will try to corrupt this so as to allow viewing over a longer time window or greater than, e.g., 30 days. This is undesirable since it will deny revenue to the provider of the content. In another illustrative embodiment, the present method is used in cryptography to ensure that a certificate is no longer actually valid.
Hence the present method is directed towards solving the above stated problem of detecting any of tampering, faking, replacement or removal relating to timing operations. These timing operations are also referred to as a “timer” or “time” or “clock” or “clock signal” in the field. The present method is directed towards taking time samples of the operating system or other clock which is being monitored and applying digital signal processing techniques to determine any corruption (tampering) in the clock. Two main types of corruptions are detected here. The first is clock rate tampering. The second is time shifting, which means changing the clock value without modifying the clock rate in the past or in the future. Different techniques are employed for detecting each of these. The present method also provides an incremental way to check for clock (timing) modifications with a limited number of past records. Thereby a very long period of time may be covered with a limited quantity of stored data.
The present method applies digital signal processing to clock change detection, using signal modulation and frequency transposition. One cannot guarantee that the current method's routine will be executed at accurate time intervals since it is not necessarily implemented on top of a real-time operating system. The method must therefore deal with time latencies. Timers are used here as accurate enough to provide the information required.
The following steps illustrated in
At d0 (at time t0=0), start a timer 16, hereafter referred to as “Timer”. This is actually the first time routine 10 is executed.
At repetitive sampling intervals, not exactly defined as explained above, one takes time clock measures at 18 and the associated values of Timer. Then both are stored into a SAMPLES_NUMBER long memory array. This array is referred to as ƒ(t)=currentDate.
When the array f(t) is fully filled (as determined by a variable referred to here as SAMPLES_NUMBER entries), the derivative f′(t) of f(t) is computed at 26 in
Since the timer and clock values should be proportional between each other as shown in
ƒ(t) should be an affine function;
ƒ′(t) should be constant;
g(t) should be an affine function (a t+b) in most cases but not if there is tampering, see below.
Next, modulate the function g(t) at 26 in
In order to keep track of the previous information (since only a maximum of SAMPLES_NUMBER values are stored), next one performs a Fourier Transform or equivalent, referred to here generically as a Fourier Transform (which is, e.g., a Fast Fourier Transform, hereafter “FFT”) in order to switch to the corresponding frequency representation. (The FFT is an algorithm to compute the discrete Fourier Transform, and is well known in digital signal processing. The FFT is one type of Fourier Transform, which generally transforms one function, here the timing signal, into a frequency representation. Other suitable non-Fourier transforms may be used, such as other types of Fourier analysis or other transform types such as Laplace, Mellin, two-sided Laplace, Hartley, Chirplet, Hankel or others, all of which are well known in the field) The previous signal has the corresponding representation as shown in
Max(FFT(h(t))) is a constant and predictable value. A focus on this f0 peak in
For future measurements, resulting frequency representation are added to the previous ones as shown at 30 in
During initialization at 16 in
When timer T is started at 16, the first clock value retrieved will be used as f(t0), for t=0. Subsequent values of the timer (referred to as t(n)) do not need to be taken at equal intervals.
The detection at 36 in
The associated software pseudo-code to do these checks is expressed as:
A major advantage of this method is the possibility to track clock modifications over a very long period, using only a limited SAMPLES_NUMBER array at 30 in
The Fast Fourier Transform graph in
The clock rate tampering attack consists of changing the rate of the system clock. Most of the time this attack would be useful in lowering the clock rate to simulate a lower date. In
Given a known hardware platform for the operating system, persistency of the present method can be implemented using non-volatile and secure memory storage for the data, other than a hard disk drive (which is generally not secure). This provides secure persistency for system reboots and shutdowns.
Variables, parameters and constants referred to in this disclosure are as follows:
These may be used in a computer program (software) which embodies the present method, coding of which (e.g., in the “C” computer language) would be routine in light of this disclosure. Also contemplated in addition to the method are such a computer program and a computer readable media storing the code for carrying out the computer program, as well as a programmed computer or computing device or other electronic device which would carry out this method in software or hardware (circuitry).
This disclosure is illustrative and not limiting; further embodiments and modifications will be apparent to those skilled in the art in light of this disclosure and are intended to fall within the scope of the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
6671608 | McKenzie et al. | Dec 2003 | B2 |
7509421 | Lambert | Mar 2009 | B2 |
7861308 | Strohwig et al. | Dec 2010 | B2 |
20090089398 | Lambert | Apr 2009 | A1 |
20100011214 | Cha et al. | Jan 2010 | A1 |
20110041186 | Strohwig et al. | Feb 2011 | A1 |
Number | Date | Country | |
---|---|---|---|
20090249108 A1 | Oct 2009 | US |