It's great to see an ever-growing awareness of Application Protection, particularly on Mobile devices. Gartner's latest Market Guide report on Application Shielding (or RASP - Runtime Application Self Protection) is now released and Inside Secure's Code Protection technology is featured.
So, you’ve got your great idea on how to revolutionize the market! Wait, before you start, have you addressed security?
Let’s address security step-by-step.
Two major new regulations are driving massive changes to how organisations manage their customers’ data. The first of these new regulations is the General Data Protection Regulation (GDPR). This affects all organisations that process or store personal data of EU citizens. The second regulation is 2nd Payment Services Directive (PSD2). This focuses on opening up banking services to non-banks and securing online payments with Strong Customer Authentication.
In November of 1999, DIRECTV made it a priority to create an in-house security team that would take ownership of broadcast and content delivery security. SypherMedia International (SMI) was formed by members of the DIRECTV Engineering and Conditional Access Group in August of 2003. Before SMI was created, the now SMI team along with fellow DIRECTV members were responsible for re-engineering the security approach of the Pay TV broadcast. This team eliminated piracy at DIRECTV and it has remained secure for more than 15 years.
Last month, Inside Secure and Yospace announced their combined solution to prevent or bypass ad blocking. This solution addresses the estimated $75 billion that publishers alone are expected to lose by 2020 from loss of ad revenue, according to research published by Ovum.
Out in the wilderness, it is a known instinct that at times the key to survival is to stay invisible. Chameleons are just one of many examples that have mastered the art of camouflage as an important tool for survival, protecting themselves against the many dangers that might bring an end to their life if they are spotted and targeted.
In a major leap, transfer this thought into modern chip design – where new, innovative concepts are created by bright designers who find themselves in a different struggle to survive against hackers who dedicate their passion and sophistication to steal data and even the design itself.
In a nearly Darwinian survival of the fittest, if your design can’t be protected from such hackers, it’s dead! You must not only make sure that your data is kept safe while stationary, in transit or in process, but you must protect your very design as well, avoiding third parties from performing unauthorized copies and use of your design.
An effective way to do this is to apply the concept of camouflage to impair the ability of predators to understand your design. If a wild wolf would look at a rabbit and see an elephant, he would surely not attempt to hunt it, as his odds would be surely against success.
In this paper we will show how a bit of illusion can be used to avoid unauthorized copies, and if they do happen, how to make sure that the end result of the copy is so badly damaged that it becomes useless.