A short rant on copy protection


by Mike Stay, May 2001

Courtesy of fravia's searchlores.org

protec
Back to 'how to protect better'


Mike Stay is a wise wizard and a talented password breaker (winzip famous). He's inter alia the Author of the recent "ZIP Attacks with Reduced Known Plaintext", that springer is going to publish next summer... head his words and enjoy this small snippet. Let's hope he'll send more!
"One bit of commitment, \ That's all I really need, \ So send me your hashed answer \ And the random seed..."
Enjoy!

Hi, Fravia.  Find below some thoughts on copy protection.  I don't
think there's anything particularly new here, but many may not have
considered some of these things before.  It's probably the most
coherent version of my opinion that I've written to date...

...Work well,
Mike
A short rant on copy protection

As a protectionist, our goal is simple: we want to make lots of money. Where there's money, there's economics, and we have to analyze opportunity costs and other similar stuff. It pretty much boils down to the fact that we have a skill that others don't, and we're willing to trade our time and skill for their money. They believe that our skills are worth their money; they believe that if they pay us some small amount of money, then their software will be protected from those who want to steal it, thus earning them more money than they paid us, and so are willing to make the trade.

The most important part of this is that the customer believes it's beneficial to him in the long run. At this point we also have to factor in ethics. We can lie to our potential customers and sell them a wrapper that does absolutely nothing; it's a lot cheaper and just as effective as most other copy protections! Of course, if anyone finds out that it doesn't do anything, we could be sued for fraud, so we can make a token effort and then advertise it like mad.

This seems to be the tack that Microsoft has taken, and it has worked very well for them. Bill Gates knows how to market products. He is extraordinarily good at it, as his assets attest. Most of us, however, especially those who are likely to be reading this, are much better programmers than marketers. We generally have to be content to write good software until word of mouth has given us enough business that we can pay someone that's better at advertising than we are to go push our product to the masses of exploited software authors.

This also has the added benefit of being completely ethical and rewarding in a way that money could never be: we can take pleasure our entire lives in a job well done. Since I believe that souls are eternal, that's a very good investment.

Now we come to the elements of good security design. What are the goals of the software author? What threat model is he most concerned about? How much is he willing to spend? Once we have addressed these questions, we can design a system that fits the parameters, or show that it cannot possibly be done.

The goal of the software author is the same as ours: to make money. If the software is valued by the market such that if people could not steal it, they would not buy it, there is no need for copy protection. In fact, in such cases it is advantageous to have the software distributed for free: if any of those that at one time were pirating ever decide to buy, they are much more likely to buy the software they had been pirating than a competitor's product. In many cases, however, illegal copying of software leads directly to loss of revenue. Software authors in this kind of market have a need for our services.

For most shareware, updates are so frequent, the software is such low quality, and the pricing is so cheap that simple serial unlocking schemes are sufficient. It's true that it only takes one NOP to break the scheme, but it's usually not worth the cracker's time to look at it in the first place.

When it is worth doing something more, it has to be something significantly more. A glance at the stuff going on at places like fraviamb.cjb.net is enough to see that even the best commercial protections on the market are broken within days, if not hours. FlexLM, ASProtect, VBox, and most dongles are swept aside with impunity.

From the cracker's point of view, the copy protection is like a tumor that has to be excized. Too often, it's a self-contained benign cyst. What we need are malignant tumors that have tendrils extending to every part of the program. It will take the cracker's equivalent of chemotherapy to even phase the protection, and even then it may only go into remission for a while. Variables in the program should be initialized dependent on the serial code that's entered. A small check can prevent most typing errors while allowing many invalid codes that prevent the program from functioning at all.

Often, only a part of the functionality is disabled. If this is the case, there is a simple, straightforward way to prevent access to the code: don't give it to them. When they register, send them a .dll with the functionality in it. What if the cracker distributes the .dll? That's fine. He could more easily have distributed a valid serial number.

An equivalent scheme uses cryptography; instead of sending the .dll when the customer registers, one sends an encrypted .dll with the program and provides a decryption key on registration.

On a related topic, Bram Cohen (http://www.gawth.com/bram) has conjectured "There is a method of encoding any program such that the encoded form of the program can be sent to an untrusted party and the untrusted party will be able to determine the outputs of the program when given any particular set of inputs but will be incapable of determining anything about the program's structure other than what can be deduced from the amount of time it took to compute the answer and the amount of memory it used."

While there has been some work in the field of secure computing, the model here is significantly different. In secure computing, at least two exchanges are necessary. In one model, Alice sends blinded data to Bob, who acts on it and returns it; then Alice unblinds the result. Alice learns nothing about Bob's function other than that single data point, and Bob learns nothing about Alice's data other than its size and the running time. In another model, Bob sends Alice a blinded function; she computes a blinded answer and sends it to Bob, who unblinds it for her and returns it.

Here, there is only one transfer, from Bob to Alice. Alice computes real outputs from a blinded function. If anyone figures out a way to do this, it will be a huge advance in cryptography and computer science.

Bob's blinded function, however, can be distributed freely. What if he is concerned with distribution of the fully functional software? As far as anyone knows, this situation requires processing power that is not under the cracker's control. A java dongle or a server on the internet can authenticate a client and perform some of the program's functionality. In order to break the system, a cracker must write new code to fill in the blanks; that is as good as one can hope for.

--
Mike Stay
coryphæus reperiendi
www.accessdata.com/crypto

protec

(c) III Millennium: [fravia+], all rights reserved