Building on key hardware technology developed by the Trusted Computing Group we propose to develop a powerful system that will significantly raise the bar for software piracy and tampering. Prior attempts at solving this problem have generally relied on security- through-obscurity which offers little deterrence to a sophisticated attacker. Our approach integrates a sophisticated hardware module that is already widely deployed in personal computers with an augmented kernel leading to an unprecedented level of protection against piracy, reverse-engineering, and tampering. This integrated approach builds a chain of trust beginning with the hardware and ending with application software which is to be executed. This chain of trust is secured with state-of-the-art cryptographic algorithms. During Phase I, we will develop software modules which will demonstrate the efficacy of the system. Phase II will build on the results of the Phase I work resulting in a high-quality product ready to be integrated into application software by customers around the world with minimal effort.
Keywords: Copy Protection, Piracy, Reverse Engineer, Tamper, Security, Trusted Computing Group, Cryptography, Hacking