Tracing pirate cards as part of the satellite video...
Transcript of Tracing pirate cards as part of the satellite video...
![Page 1: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/1.jpg)
Tracing pirate cards as part of the satellitevideo broadcasting
ULRICH AIVODJI, ALEXANDRE GONZALVEZ,PASCAL LEFEVRE, BRANDON DRAVIE
Supervisors: CECILE DELERABLEE, THOMAS BAIGNERES
REDOCS’16 Report
28th October
![Page 2: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/2.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
1 Problem
2 Performance Metrics
3 Strategy 1
4 Strategy 2
5 Strategy 3
6 Bilan & Perspective
1 / 21
![Page 3: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/3.jpg)
Table of contents
1 Problem
2 Performance Metrics
3 Strategy 1
4 Strategy 2
5 Strategy 3
6 Bilan & Perspective
![Page 4: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/4.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Problem
Satellite broadcasting
Killer ECM
Id target
c© 2 / 21
![Page 5: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/5.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Problem
Hacking
Killer ECM
Id target
c© 2 / 21
![Page 6: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/6.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Problem
Provider:Pirate client
Killer ECM
Id target
c© 2 / 21
![Page 7: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/7.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Problem
Provider:Pirate client
Killer ECM
Id target
c© 2 / 21
![Page 8: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/8.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Problem
Provider:Pirate client
Killer ECM
Id target
c© 2 / 21
![Page 9: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/9.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Pirate Strategies
1 strategy1(r, CW0, . . . , CWn−1)→ CW0
2 strategy2(r, CW0, . . . , CWn−1)→{
majority(CW0, . . . , CWn−1) if n is oddCW0 else
3 strategy3(r, CW0, . . . , CWn−1)→ CWr mod n
3 / 21
![Page 10: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/10.jpg)
Table of contents
1 Problem
2 Performance Metrics
3 Strategy 1
4 Strategy 2
5 Strategy 3
6 Bilan & Perspective
![Page 11: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/11.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Metrics
CPU Time (s)
Collateral damage ColD (Avg, stddev): ∑(1− idiN )
QoS of the pirate (Avg): 100 ∗ tT (T: number of normal ECMs, t:
number of correct cw)
4 / 21
![Page 12: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/12.jpg)
Table of contents
1 Problem
2 Performance Metrics
3 Strategy 1
4 Strategy 2
5 Strategy 3
6 Bilan & Perspective
![Page 13: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/13.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
General principle
Hypothesis: The traitor always uses the same card.Goal: Locate the card by using a minimum number of trackingECM. Killing the card willSolution: Binary search (average number of iterations log(n))
5 / 21
![Page 14: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/14.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Benchmark
CPU Time (s) Collateral damage QoSAvg Stddev Avg
Binary Search 54.37 14.11 8.14 0Ternary Search 54.18 17.52 10.78 0
Table: Benchmark for 100 runs and nbCard = 10
6 / 21
![Page 15: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/15.jpg)
Table of contents
1 Problem
2 Performance Metrics
3 Strategy 1
4 Strategy 2
5 Strategy 3
6 Bilan & Perspective
![Page 16: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/16.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Strategy 2
Notations
Mt : pirate response to ECM tracer tMt ∈ L : majority of pirate cards identifiers are < t(on the left side)Mt ∈ R : majority of pirate cards identifiers are ≥ t(on the right side)
7 / 21
![Page 17: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/17.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Strategy 2: Why binary search works.
Proposition
Let p = 2k + 1 cards (majority vote) and t′ < t two tracers ECM.Mt ∈ L and Mt′ ∈ R =⇒ ∃ IdP ∈ [t′, t[.
| |t
t′0 N− 1+ + + + + + +
Lt Rt
Lt′ Rt′
8 / 21
![Page 18: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/18.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Algorithm
Pivots
p← 0p′ ← N− 1
Details
Stops when |p− p′| = 1ECM tracer tm ← b(p + p′)/2cif Mtm ∈ L , p′ ← tmelse p← tm
9 / 21
![Page 19: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/19.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Benchmark Strategy II
CPU Time (s) Collateral damage QoSAvg Stddev Avg
Optimal approach 249.82 50.35 17.24 0Paper approach [Tas05] 94.69 50.55 15.10 0
Table: Benchmark for 100 runs and nbCard = 10
Tamir Tassa, Low bandwidth dynamic traitor tracing schemes, J.Cryptol. 18 (2005), no. 2, 167–183.
10 / 21
![Page 20: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/20.jpg)
Table of contents
1 Problem
2 Performance Metrics
3 Strategy 1
4 Strategy 2
5 Strategy 3
6 Bilan & Perspective
![Page 21: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/21.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Strategy 3Description
11 / 21
![Page 22: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/22.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Strategy 3Description
Pirate Strategy
Own a number n of cards, and generates randomly and uniformly an numberr larger than n.
- made only of correct values cw
- made only of incorrect values of cw
- made both of correct and incorrect values of cw
11 / 21
![Page 23: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/23.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Strategy 3Description
Pirate Strategy
Own a number n of cards, and generates randomly and uniformly an numberr larger than n.
- made only of correct values cw
- made only of incorrect values of cw
- made both of correct and incorrect values of cw
11 / 21
![Page 24: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/24.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Strategy 3Description
Pirate Strategy
Own a number n of cards, and generates randomly and uniformly an numberr larger than n.
- made only of correct values cw
- made only of incorrect values of cw
- made both of correct and incorrect values of cw
11 / 21
![Page 25: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/25.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Strategy 3Description
Pirate Strategy
Own a number n of cards, and generates randomly and uniformly an numberr larger than n.
- made only of correct values cw
- made only of incorrect values of cw
- made both of correct and incorrect values of cw
11 / 21
![Page 26: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/26.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Strategy 3Algorithm
0 N− 1
Population : N-1 cards
12 / 21
![Page 27: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/27.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Strategy 3Algorithm
0 N− 1(P−1)∗NP
0 N− 1
P pirates cards→ P - 1 intervals
13 / 21
![Page 28: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/28.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Strategy 3Algorithm
(P−1)∗NP
N− 1
Condition for dichotomy
In [A;B], if NbrCardsFalse > 0 , then at least a pirate card is present.
14 / 21
![Page 29: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/29.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Strategy 3Algorithm
0 N− 1(P−m)∗NP
0 N− 1
With m intervals.
15 / 21
![Page 30: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/30.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Strategy 3Algorithm
(P−m)∗NP
N− 1
Condition for dichotomy
In [A;B], if NbreCardsFalse - (nbCardsMute+0.6)*Cst > 0 ,then at least a pirate card is present.
16 / 21
![Page 31: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/31.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Benchmark Strategy III
CPU Time (s) Collateral damage QoSAvg Stddev Avg
Heuristic approach 631.29 68865 35630 57
Table: Benchmark for 100 runs and nbCard = 10
17 / 21
![Page 32: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/32.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
General principle for Strategy III version II
Return a set of small intervals that have a good probability tocontain id of the traitor’s cardsLet S = {0, 1, 2, . . . , n− 1} be the set of all the cards (regular userand traitors).Divide S in 100 subsets and select subsets Sj that pass the test.The test take a subset Sj = [a, b], uses a and b as input for atracking ECM send nbSample times.Let ProbA be the chance to have negative response with trackingECM a and ProbB be the chance to have positive response withtracking ECM b.Reject Sj if abs(ProbA− ProbB) > epsilon and accept Sj otherwise.Repeat until |Sj| ≤ 1000.
18 / 21
![Page 33: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/33.jpg)
Table of contents
1 Problem
2 Performance Metrics
3 Strategy 1
4 Strategy 2
5 Strategy 3
6 Bilan & Perspective
![Page 34: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/34.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Bilan
Optimal counter attack against strategy I and II2 heuristic approaches for strategy III
19 / 21
![Page 35: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/35.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Perspectives
Find theoretical bound for strategy IIIExplore game theory alternative (Bilevel optimization)
minidi
∑i(1− idi
N)
s.t. QoS(pirate) ≤ ε
idi ∈ {0, 1}
20 / 21
![Page 36: Tracing pirate cards as part of the satellite video ...confiance-numerique.clermont-universite.fr/redocs... · ECM. Killing the card will Solution: Binary search (average number of](https://reader034.fdocuments.us/reader034/viewer/2022051606/601f6e130b75102b516eb6b9/html5/thumbnails/36.jpg)
ProblemPerformance Metrics
Strategy 1Strategy 2Strategy 3
Bilan & Perspective
Bonus
Content
ChallengesKnowlegde
Interesting tools and methods
Teamwork with efficiency (AGILE method)Tools: GitHub, CollabEdit
Social
Contacts, colleagues, friends, fun...
21 / 21