13.03.2013 Views

Hacking the Xbox

Hacking the Xbox

Hacking the Xbox

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 7 - A Brief Primer on Security 117<br />

In addition, protocol attacks find weaknesses in <strong>the</strong> way keys and data are<br />

manipulated, or in <strong>the</strong> way strong ciphers are used. The WEP attack on<br />

RC-4 and Mike Bond and Ross Anderson’s attack on <strong>the</strong> IBM 4758<br />

Cryptoprocessor are both examples of protocol attacks. The red flags<br />

for potential protocol attacks are systems that implement backwardcompatibility<br />

measures, and systems that are implemented by engineers<br />

whose primary job is not crypto-security.<br />

Finally, in a system like <strong>the</strong> <strong>Xbox</strong> where one of <strong>the</strong> goals is to establish a<br />

trustable client, back doors and buffer-overrun attacks are also viable attacks<br />

on <strong>the</strong> trust state of a machine. No widely used commercial processors<br />

embed execution privileges within instruction streams or data tags. Processors<br />

blindly execute any piece of code that it is instructed to jump to,<br />

whe<strong>the</strong>r or not <strong>the</strong> jump was induced through a transient hardware failure<br />

or through maliciously placed code. Periodic hashes on <strong>the</strong> machine state can<br />

be used to counter this deficiency, but even <strong>the</strong>n <strong>the</strong> state checks can be<br />

spoofed.<br />

As discussed in <strong>the</strong> beginning of this chapter, establishing <strong>the</strong> trust state<br />

of a client also requires a piece of tamper-resistant hardware to carry <strong>the</strong><br />

seed of trust. The amount of physical security must be enough to make it<br />

uneconomical to defeat <strong>the</strong> security once, and robust enough such that<br />

one instance of broken security does not enable trivial attacks on <strong>the</strong><br />

remainder of <strong>the</strong> consoles. Some of <strong>the</strong> trade-offs when designing<br />

physical security as well as <strong>the</strong> decisions made by Microsoft to this end<br />

are discussed in <strong>the</strong> next chapter.<br />

The moral of this chapter is that security requires a well-designed system.<br />

Although ciphers have become strong enough to make brute-force attacks<br />

moot, systems have grown in complexity. This complexity increases <strong>the</strong><br />

likelihood of a viable protocol or back door attack, yet does little to save<br />

users from <strong>the</strong> more traditional eavesdropping, rubber-hose and user-error<br />

attacks.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!