02.04.2013 Views

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Attack the <strong>Hardware</strong><br />

Vulnerability Assessment - Basic Types of Attacks<br />

Contents Glossary Index Troubleshooting<br />

Typically, this method is extremely difficult, time-consuming, and requires<br />

very expensive equipment to do. Moreover, the <strong>Sentinel</strong> Key use chip-onboard<br />

(COB) technology for high reliability, and greater protection against<br />

reverse-engineering. The <strong>Sentinel</strong> Key memory is encrypted using multiple<br />

unique random keys to defeat memory clones.<br />

Attack the SafeNet Components<br />

Generally, the hacker targets the SafeNet-supplied components (such as,<br />

driver replacement or emulation and replay attacks), so that they return<br />

correct answers to the application without the <strong>Sentinel</strong> Key being plugged<br />

in. To combat such attacks, all the communication between the components<br />

is passed through a Secure Communication Tunnel that makes use of industry-standard<br />

algorithms (see “<strong>Hardware</strong> Key with Cutting-edge Security<br />

Technology” on page 7).<br />

Attack the Communication Between Parties<br />

The communication between the various parties involved in licensing—the<br />

developer, customer, and distributor—is also prone to attacks. For example,<br />

a customer may try applying the update code multiple times. However, due<br />

to the “one time update” capability of the hardware key, an update code cannot<br />

be used more than once.<br />

Also, the distributor may program more number of licenses for customers<br />

than he/she is allowed for. To prevent this, you can specify a limit to meter<br />

the licenses programmed. For details, refer to “Programming Distributor<br />

<strong>Keys</strong>” on page 204.<br />

Time Tampering Attacks<br />

System time tampering or rolling back of the system clock is one of the mostcommon<br />

way of license infringement for lease/trial applications. To address<br />

this, you can use <strong>Sentinel</strong> Key with real-time clock. It contains a tamperresistant<br />

internal real-time clock that indicate the exact date and time to<br />

track the usage of the leased applications. The real clock keeps track of time<br />

<strong>Sentinel</strong> <strong>Hardware</strong> <strong>Keys</strong> Developer’s <strong>Guide</strong> 169

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!