13.03.2013 Views

Hacking the Xbox

Hacking the Xbox

Hacking the Xbox

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 7 - A Brief Primer on Security 103<br />

of <strong>Xbox</strong> Live to drive hardware sales. Fur<strong>the</strong>rmore, <strong>Xbox</strong> Live is a<br />

subscription service, and one year from its launch users will have to pay a<br />

monthly fee. If Microsoft can get its subscribers hooked on <strong>Xbox</strong> Live,<br />

<strong>the</strong>n all of a sudden <strong>the</strong> <strong>Xbox</strong> business looks quite profitable, even if a<br />

substantial amount of money is lost up-front on <strong>the</strong> hardware. The trick<br />

is, of course, hook <strong>Xbox</strong> users on <strong>Xbox</strong> Live. Billed as <strong>the</strong> “Disneyland<br />

of on-line gaming,” <strong>the</strong> goal of <strong>Xbox</strong> Live is to provide a well-executed<br />

and fair gaming experience. Central to <strong>the</strong> value proposition of <strong>Xbox</strong><br />

Live that <strong>the</strong>re are no cheaters. In order to ensure that nobody is cheating,<br />

users must be forced to au<strong>the</strong>nticate <strong>the</strong>mselves against a registry<br />

maintained by <strong>Xbox</strong> Live, and <strong>the</strong>ir game state must be kept secure and<br />

unmodifiable. In addition, game software must be unpatched. Even more<br />

crucial is <strong>the</strong> fact that you only need a few cheaters to ruin <strong>the</strong> gaming<br />

experience of an entire user base. All of a sudden, <strong>the</strong> front-door security<br />

protections offered by <strong>the</strong> DVD-9 format seem inadequate. The odds are<br />

against you if you betting <strong>the</strong> success of a business on <strong>the</strong> morality and<br />

honor of a user base of millions of twenty-something hardcore male<br />

gamers with a reasonable amount of computer savvy distributed<br />

throughout. The hardware must be trustable, network connections<br />

secure, and executables signed and sealed.<br />

The statement that <strong>the</strong> hardware must be trustable bears repeating. Given an<br />

untrustable user base, <strong>the</strong> only way to establish a trust relationship with<br />

clients is if a seed of trust exists in every piece of hardware. Hence,<br />

Microsoft must include in every client a piece of tamper-proof hardware that<br />

enables some kind of attestation. Attestation is <strong>the</strong> ability to prove that<br />

some piece of data, such as a player’s identity or game state, is in fact<br />

generated by untainted software and hardware. The tamper-proof<br />

hardware does not have to implement <strong>the</strong> attestation function directly,<br />

but it must at least ensure that <strong>the</strong> system is in a trustable state before<br />

attestation.<br />

There are many ways to ensure that hardware is trustable. The bruteforce<br />

method is to make <strong>the</strong> entire piece of hardware physically secure.<br />

Automated Teller Machines are prime examples of hardware that is<br />

physically secure. Sealed in thick sheet metal and covered with intrusion<br />

sensors, it is difficult to physically penetrate and modify <strong>the</strong> hardware of<br />

an ATM. Still, hile effective, this is an impractical and expensive solution<br />

for a video game console.<br />

A more economical solution is to use a small piece of trusted tamper-proof<br />

hardware that can make “measurements” on <strong>the</strong> rest of <strong>the</strong> system. These<br />

sorts of measurements are typically accomplished through <strong>the</strong> use of a<br />

cryptographic hash function. If all of <strong>the</strong>se trust measurements conform<br />

with <strong>the</strong> expected values, <strong>the</strong>n one might be able to conclude that <strong>the</strong> entire<br />

system is trustable.<br />

I say might because this scheme is still vulnerable to man-in-<strong>the</strong>-middle<br />

attacks where a hacker sends spoofed valid data in response to a measurement<br />

query. Man-in-<strong>the</strong>-middle attacks refer to a general class of<br />

attacks where an adversary can freely modify and control <strong>the</strong> information

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!