Tracing pirate cards as part of the satellite video...

36
Tracing pirate cards as part of the satellite video broadcasting ULRICH AIVODJI, ALEXANDRE GONZALVEZ, PASCAL LEFEVRE, BRANDON DRAVIE Supervisors: C´ ECILE DELERABL ´ EE, THOMAS BAIGN ` ERES REDOCS’16 Report 28 th October

Transcript of Tracing pirate cards as part of the satellite video...

Page 1: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

Tracing pirate cards as part of the satellitevideo broadcasting

ULRICH AIVODJI, ALEXANDRE GONZALVEZ,PASCAL LEFEVRE, BRANDON DRAVIE

Supervisors: CECILE DELERABLEE, THOMAS BAIGNERES

REDOCS’16 Report

28th October

Page 2: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

1 Problem

2 Performance Metrics

3 Strategy 1

4 Strategy 2

5 Strategy 3

6 Bilan & Perspective

1 / 21

Page 3: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

Table of contents

1 Problem

2 Performance Metrics

3 Strategy 1

4 Strategy 2

5 Strategy 3

6 Bilan & Perspective

Page 4: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Problem

Satellite broadcasting

Killer ECM

Id target

c© 2 / 21

Page 5: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Problem

Hacking

Killer ECM

Id target

c© 2 / 21

Page 6: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Problem

Provider:Pirate client

Killer ECM

Id target

c© 2 / 21

Page 7: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Problem

Provider:Pirate client

Killer ECM

Id target

c© 2 / 21

Page 8: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Problem

Provider:Pirate client

Killer ECM

Id target

c© 2 / 21

Page 9: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Pirate Strategies

1 strategy1(r, CW0, . . . , CWn−1)→ CW0

2 strategy2(r, CW0, . . . , CWn−1)→{

majority(CW0, . . . , CWn−1) if n is oddCW0 else

3 strategy3(r, CW0, . . . , CWn−1)→ CWr mod n

3 / 21

Page 10: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

Table of contents

1 Problem

2 Performance Metrics

3 Strategy 1

4 Strategy 2

5 Strategy 3

6 Bilan & Perspective

Page 11: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Metrics

CPU Time (s)

Collateral damage ColD (Avg, stddev): ∑(1− idiN )

QoS of the pirate (Avg): 100 ∗ tT (T: number of normal ECMs, t:

number of correct cw)

4 / 21

Page 12: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

Table of contents

1 Problem

2 Performance Metrics

3 Strategy 1

4 Strategy 2

5 Strategy 3

6 Bilan & Perspective

Page 13: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

General principle

Hypothesis: The traitor always uses the same card.Goal: Locate the card by using a minimum number of trackingECM. Killing the card willSolution: Binary search (average number of iterations log(n))

5 / 21

Page 14: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Benchmark

CPU Time (s) Collateral damage QoSAvg Stddev Avg

Binary Search 54.37 14.11 8.14 0Ternary Search 54.18 17.52 10.78 0

Table: Benchmark for 100 runs and nbCard = 10

6 / 21

Page 15: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

Table of contents

1 Problem

2 Performance Metrics

3 Strategy 1

4 Strategy 2

5 Strategy 3

6 Bilan & Perspective

Page 16: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Strategy 2

Notations

Mt : pirate response to ECM tracer tMt ∈ L : majority of pirate cards identifiers are < t(on the left side)Mt ∈ R : majority of pirate cards identifiers are ≥ t(on the right side)

7 / 21

Page 17: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Strategy 2: Why binary search works.

Proposition

Let p = 2k + 1 cards (majority vote) and t′ < t two tracers ECM.Mt ∈ L and Mt′ ∈ R =⇒ ∃ IdP ∈ [t′, t[.

| |t

t′0 N− 1+ + + + + + +

Lt Rt

Lt′ Rt′

8 / 21

Page 18: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Algorithm

Pivots

p← 0p′ ← N− 1

Details

Stops when |p− p′| = 1ECM tracer tm ← b(p + p′)/2cif Mtm ∈ L , p′ ← tmelse p← tm

9 / 21

Page 19: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Benchmark Strategy II

CPU Time (s) Collateral damage QoSAvg Stddev Avg

Optimal approach 249.82 50.35 17.24 0Paper approach [Tas05] 94.69 50.55 15.10 0

Table: Benchmark for 100 runs and nbCard = 10

Tamir Tassa, Low bandwidth dynamic traitor tracing schemes, J.Cryptol. 18 (2005), no. 2, 167–183.

10 / 21

Page 20: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

Table of contents

1 Problem

2 Performance Metrics

3 Strategy 1

4 Strategy 2

5 Strategy 3

6 Bilan & Perspective

Page 21: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Strategy 3Description

11 / 21

Page 22: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Strategy 3Description

Pirate Strategy

Own a number n of cards, and generates randomly and uniformly an numberr larger than n.

- made only of correct values cw

- made only of incorrect values of cw

- made both of correct and incorrect values of cw

11 / 21

Page 23: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Strategy 3Description

Pirate Strategy

Own a number n of cards, and generates randomly and uniformly an numberr larger than n.

- made only of correct values cw

- made only of incorrect values of cw

- made both of correct and incorrect values of cw

11 / 21

Page 24: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Strategy 3Description

Pirate Strategy

Own a number n of cards, and generates randomly and uniformly an numberr larger than n.

- made only of correct values cw

- made only of incorrect values of cw

- made both of correct and incorrect values of cw

11 / 21

Page 25: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Strategy 3Description

Pirate Strategy

Own a number n of cards, and generates randomly and uniformly an numberr larger than n.

- made only of correct values cw

- made only of incorrect values of cw

- made both of correct and incorrect values of cw

11 / 21

Page 26: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Strategy 3Algorithm

0 N− 1

Population : N-1 cards

12 / 21

Page 27: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Strategy 3Algorithm

0 N− 1(P−1)∗NP

0 N− 1

P pirates cards→ P - 1 intervals

13 / 21

Page 28: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Strategy 3Algorithm

(P−1)∗NP

N− 1

Condition for dichotomy

In [A;B], if NbrCardsFalse > 0 , then at least a pirate card is present.

14 / 21

Page 29: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Strategy 3Algorithm

0 N− 1(P−m)∗NP

0 N− 1

With m intervals.

15 / 21

Page 30: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Strategy 3Algorithm

(P−m)∗NP

N− 1

Condition for dichotomy

In [A;B], if NbreCardsFalse - (nbCardsMute+0.6)*Cst > 0 ,then at least a pirate card is present.

16 / 21

Page 31: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Benchmark Strategy III

CPU Time (s) Collateral damage QoSAvg Stddev Avg

Heuristic approach 631.29 68865 35630 57

Table: Benchmark for 100 runs and nbCard = 10

17 / 21

Page 32: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

General principle for Strategy III version II

Return a set of small intervals that have a good probability tocontain id of the traitor’s cardsLet S = {0, 1, 2, . . . , n− 1} be the set of all the cards (regular userand traitors).Divide S in 100 subsets and select subsets Sj that pass the test.The test take a subset Sj = [a, b], uses a and b as input for atracking ECM send nbSample times.Let ProbA be the chance to have negative response with trackingECM a and ProbB be the chance to have positive response withtracking ECM b.Reject Sj if abs(ProbA− ProbB) > epsilon and accept Sj otherwise.Repeat until |Sj| ≤ 1000.

18 / 21

Page 33: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

Table of contents

1 Problem

2 Performance Metrics

3 Strategy 1

4 Strategy 2

5 Strategy 3

6 Bilan & Perspective

Page 34: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Bilan

Optimal counter attack against strategy I and II2 heuristic approaches for strategy III

19 / 21

Page 35: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Perspectives

Find theoretical bound for strategy IIIExplore game theory alternative (Bilevel optimization)

minidi

∑i(1− idi

N)

s.t. QoS(pirate) ≤ ε

idi ∈ {0, 1}

20 / 21

Page 36: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of

ProblemPerformance Metrics

Strategy 1Strategy 2Strategy 3

Bilan & Perspective

Bonus

Content

ChallengesKnowlegde

Interesting tools and methods

Teamwork with efficiency (AGILE method)Tools: GitHub, CollabEdit

Social

Contacts, colleagues, friends, fun...

21 / 21