Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Technology (Apple) Patents Technology

Apple Files Patent for "Tamper-Resistant Code" 401

freaktheclown writes "The US Patent and Trademark Office has revealed that Apple has filed patent no. 20050246554 for a "system and method for creating tamper-resistant code." The system is presumably for use in Apple's Intel version of its Tiger operating system."
This discussion has been archived. No new comments can be posted.

Apple Files Patent for "Tamper-Resistant Code"

Comments Filter:
  • by Paska ( 801395 ) * on Wednesday November 09, 2005 @08:50PM (#13994117) Homepage
    For those who are interested, link to the original application publication. [uspto.gov]
  • by jockm ( 233372 ) on Wednesday November 09, 2005 @08:59PM (#13994191) Homepage
    They didn't say tamper-proof. They said resistant. The scheme they describe would make it rather hard to alter they bytestream.

    The Titanic was really sink-resitant...
  • Missed the point (Score:4, Informative)

    by rhesuspieces00 ( 804354 ) on Wednesday November 09, 2005 @09:22PM (#13994346) Homepage
    This article has been up on mac-centric news sites for a while now. The difference is that all the others pointed out the more interesting aspect of the new patents: You can select, from MacOS X, Windows, and Linux a primary OS and secondary OS.

    So not only is Apple not preventing users from installing Windows or Linux along side OS X, they are going out of their way to enable them to do so.

    Michael Dell is feeling a tightening of the rectum right about now.

    And yet...slashdotters are still preoccupied with how Apple might someday try to prevent the OS from being installed on non-Apple hardware.
  • by wickedsteve ( 729684 ) on Wednesday November 09, 2005 @09:47PM (#13994496) Homepage
    That was tamper-resistant not tamper proof. I believe it will stand there next to flame-resistant items and water-resistant stuff.
  • Re:Sounds impossible (Score:5, Informative)

    by StikyPad ( 445176 ) on Wednesday November 09, 2005 @11:08PM (#13994954) Homepage
    Sounds kind of like having an acid that can eat through anything. How do you can you keep it in a container if it can eat through anything?

    By separating it into 2 or more inert components and storing them seperately. How is that at all like tamper-resistant code?

    It's not impossible to create code that is very difficult to alter in a desirable manner, unless that desire is to have it cease functioning. The current StarForce copy protection achieves this by encrypting the executable and libraries of the program in question, and then running them on its own virtual machine which runs at the driver level. It sounds like Apple is planning to do exactly the same thing, unless I'm misinterpreting their patent. Each of their points says:
    "a machine-readable medium that provides instructions, which when executed by a machine, cause the machine to perform operations comprising: installing a first object code program, wherein the installing includes, statically translating the first object code program into a second object code program that is executable on a machine, wherein the statically translating includes, determining an identifier based on a state of the machine or a user attribute; and obfuscating the first object code program or the second object code program, wherein the obfuscating depends on the identifier; and storing the second object code program for execution by the machine."
    But that's just how I'm reading it.. I could be wrong. At any rate, StarForce has yet to be cracked directly, but since its main purpose is to prevent copying, other weaknesses have been exploited; mainly in the area of virtual drives. Evidently it tries to identify the drives on a system, and if it successfully IDs one, it will require the disc to be placed in that drive. To ensure forward compatibility, if it cannot identify any of the drives, it will accept any drive that the disc appears to be in. It still attempts to blacklist virtual devices though, so the virtual drive software must be obfuscated. As I said, the only successful means of defeating the protection thus far have been to alter the data external to the program; the executables and DLLs themselves have not been successfully cracked, except when the publisher opted not to use encryption.
  • by podperson ( 592944 ) on Wednesday November 09, 2005 @11:24PM (#13995017) Homepage
    So patents are apparently written in a very strange way for reasons that no doubt make sense to someone. Aside from converting a tree structure into a series of numbered paragraphs (this patent describes an X being comprised of Y and Z. The Y comprises a Q, R, and S. etc.) it is also written in a bewilderingly specific and yet vague way so as to at all times make it clear that whenever they talk about something in particular, they in fact mean to include stuff that they haven't mentioned and may not even have thought of.

    So, having tried to wade through all of this, here's my potted summary.

    A "tamper-resistant" code block can be created *automatically* (i.e. not by hand) by translating an ordinary code block into a tamper-proof code block. The tamper proof code-block may be composed of checksummed code with extra inserted code that performs arbitrary operations (using, for example, information stored on a ROM, or taken from the computer's clock, or from the user's settings) and then is expected to produce a specific result.

    E.g. multiply the current time by the user's name converted into a number and subtract the checksum of the code block and produce the number it did when the code was initially "tamper-proofed".

    To verify the code has not been tampered with it can be executed in an environment (a virtual machine, say) which behaves like the real environment but where system calls have no effect so that only the ancillory results are produced. If these results aren't right, the code block is rejected.

    I'm probably missing a lot, but the proposed system is AT LEAST this sophisticated, which is a heck of lot more convoluted than, say, checksumming code blocks. I think figuring this out is well beyond the script kiddies that produce the majority of malware.
  • by qengho ( 54305 ) on Thursday November 10, 2005 @12:16AM (#13995283)


    remember when microsoft dropped office for the mac.

    Sure don't. You must be thinking of Internet Explorer, abandoned years ago at version 5. Office is still supported on the Mac.

  • by brdsutte ( 576841 ) on Thursday November 10, 2005 @03:27AM (#13995970)
    And hey, we only needed one machine to implement this. Moreover, in our technique, the program rewrites itself, and it does so fully automatically, so no manual editing is required. Look for our paper on "Software Protection through Dynamic Code Mutation" at last week's Workshop on Information Security Applications (WISA2005), which you can download at www.elis.ugent.be/~brdsutte.
  • by Mister Transistor ( 259842 ) on Thursday November 10, 2005 @03:29AM (#13995978) Journal
    It's not that it's unhackable, it's just too much trouble to have been broken so far. The encryption engine and relevant microcode is hidden deep in an ASIC, and no one has been able to secure an e-beam slicer long enough to open it up. There are only a few of them at major universities and chip fab labs, and it's pretty hard to "borrow" time on them during your lunch hour for such a "project". Someday, it will probably be broken but it has served the purpose of any successful encryption system - to keep sensitive data from prying eyes until it's no longer sensitive.

    Actually, no one ever really cracked the P3 DRM either, what was known was due to internal leaks, rumored to have been possibly deliberate, as NDC (Rupert Murdoch) owns their competitor, Dish Network! Anyway, the P3 hacks were all workarounds that still needed the real hardware DRM decryption engine to do the work. There was rumors of a soft decryptor, but I never saw one and personally I think that was vaporware.
  • by Budenny ( 888916 ) on Thursday November 10, 2005 @06:48AM (#13996438)
    Here are some of the confused arguments one comes across.

    Apple should not sell the OS seperately because I don't want to buy it. I want the integrated experience. Its a non-sequitur, if that's what you want, buy it. Why should it not sell to others who don't want it?

    Apple is a hardware manufacturer and if it allows people to run the OS on other hardware, it will go out of business. People who argue this, then turn around and claim that Apple hardware is better cheaper and faster than anyone else's. So why will unbundling not lead to a boom in hardware sales?

    Apple shouldn't lock its OS at all. Why not? Of course, its entitled to protect its investment by product activation or DRM or whatever. Everyone else does.

    Finally, we have the argument, if its unbundled, people will try to run it on hardware which will not run it, and this will put off buyers and damage the reputation of the company. This is crazy. It will be shipped with a list of what is supported. And manufacturers of cards, mainboards etc will tell you what the OS requirements are. They do it now, after all. Why would they stop?

    Finally we have the argument, people who buy X and run it on their Toshibas (as ZD-net seems to have done) will not be having the Apple Experience. Well, maybe not. Why do you care? If you want to have the Apple Experience, which seems to consist in looking at a particular case while using X, go ahead. But this is not a reason for selling other people the unbundled X experience, if this is what they want.

    The more I hear people arguing about this, the less sense it makes. Surely the point is, sell the customer what he wants to buy. He probably really does know what he wants. Let the customer worry about value for money and the sort of experience he is having. Don't try to dictate what he is supposed to want or how he is supposed to feel.

  • This is pure EVIL!! (Score:1, Informative)

    by Anonymous Coward on Thursday November 10, 2005 @07:46AM (#13996564)
    At least that's what would be claimed over and over again here if it were Microsoft rather than Apple filing this patent.

"Gravitation cannot be held responsible for people falling in love." -- Albert Einstein

Working...