30 likes | 118 Views
Architecting Systems to Protect Intellectual Property. Presentation to NZTE China Workshop Prof. Clark Thomborson Auckland NZ 16 th November 2007. Legal. Illegal. Moral. Inexpensive. Easy. Expensive. Immoral. Easy. Difficult. Difficult. Lessig’s Taxonomy of Control. IP theft.
E N D
Architecting Systems to Protect Intellectual Property Presentation to NZTE China Workshop Prof. Clark Thomborson Auckland NZ 16th November 2007
Legal Illegal Moral Inexpensive Easy Expensive Immoral Easy Difficult Difficult Lessig’s Taxonomy of Control IP theft Ideally: it would be difficult, immoral, expensive, and illegal for anyone to misappropriate your IP.
Defense in Depth for Software IP • Prevention: • Don’t allow unauthorised use (licence control). • Don’t let anyone read your code (black box). • Don’t let anyone decipher your code (encryption). • Don’t let anyone understand your code (obfuscation). • Don’t let anyone modify your code (tamper-proofing). • Detection: • Monitor subjects (user logs). Requires user ID and user surveillance. • Monitor uses (execution logs). Requires code ID (hashingorwatermarking) and platform surveillance. • Monitor objects (inventory logs). Requires code ID, storage surveillance. • Monitor platforms (platform logs). Requires tamper-evident platforms and platform surveillance. • Response: • Automated. Requires a trusted platform which can “call for help”. • Offline. Requires a trusted inspector (to read the logs).