Advertisement

Software-Based Copy Protection for Temporal Media During Dissemination and Playback

  • Gisle Grimen
  • Christian Mönch
  • Roger Midtstraum
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3935)

Abstract

We present a software-based protection mechanism to prevent unauthorized copying of media documents during their presentation on a clients host. Our solution enforces the execution and continuous replacement of security mechanisms on the clients host. Each protection mechanism is only used for a short time interval before it is replaced. The short duration of the time interval prevents a successful analysis and attack of the mechanism. In this way we solve a shortcoming of current solutions. As those employ fixed protection mechanisms they will eventually be circumvented because attackers have virtually unlimited time to analyze them.

Keywords

Temporal Medium Security Server Content Provider Malicious User Content Owner 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Anckaert, B., De Sutter, B., Chanet, D., De Bosschere, K.: Steganography for executables and code transformation signatures. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 425–439. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  2. 2.
    Aucsmith, D.: Tamper Resistant Software: An Implementation. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 317–333. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  3. 3.
    Camp, L.J.: Drm: doesn’t really mean digital copyright management. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 78–87. ACM Press, New York (2002)Google Scholar
  4. 4.
    Chang, H., Atallah, M.J.: Protecting Software Code by Guards. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 160–175. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Chen, Y., Venkatesan, R., Cary, M., Pang, R., Sinha, S., Jakubowski, M.H.: Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 400–414. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Chow, S., Gu, Y., Johnson, H., Zakharov, V.A.: An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 144–155. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Cohen, F.B.: Operating system protection through program evolution. Computers and Security 12(6), 565–584 (1993)CrossRefGoogle Scholar
  8. 8.
    Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation: tools for software protection. IEEE Trans. Softw. Eng. 28(8), 735–746 (2002)CrossRefGoogle Scholar
  9. 9.
    Collberg, C., Thomborson, C., Low, D.: Breaking Abstractions and Unstructuring Data Structures. In: ICCL 1998: Proceedings of the 1998 International Conference on Computer Languages, Washington, DC, USA, p. 28. IEEE Computer Society, Los Alamitos (1998)Google Scholar
  10. 10.
    Collberg, C., Thomborson, C., Low, D.: Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. In: Principles of Programming Languages 1998, POPL 1998, San Diego, CA (January 1998)Google Scholar
  11. 11.
    National Research Council. The Digital Dilemma - Intellectual Propert In The Information Age. Technical report, National Reasearch Council, USA (January 2000)Google Scholar
  12. 12.
    Hauser, T., Wenz, C.: DRM Under Attack: Weaknesses in Existing Systems. In: Becker, E., Buhse, W., Günnewig, D., Rump, N. (eds.) Digital Rights Management. LNCS, vol. 2770, pp. 206–223. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  13. 13.
    Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  14. 14.
    Horne, B., Matheson, L.R., Sheehan, C., Tarjan, R.E.: Dynamic Self-Checking Techniques for Improved Tamper Resistance. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 141–159. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  15. 15.
    Huang, A.: Keeping Secrets in Hardware: The Microsoft XBox Case Study. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 213–227. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  16. 16.
    Kocher, P., Jaffe, J., Jun, B., Laren, C., Lawson, N.: Self-Protecting Digital Content. Technical report, Cryptography Research Inc. (April 2003)Google Scholar
  17. 17.
    Ogiso, T., Sakabe, Y., Soshi, M., Miyaji, A.: Software tamper resistance based on the difficulty of interprocedural analysis. In: The Third International Workshop on Information Security Applications (WISA 2002), pp. 437–452 (August 2002)Google Scholar
  18. 18.
    Orlowski, A.: Itunes drm cracked wide open for gnu/linux, seriously. The Register (January 2004)Google Scholar
  19. 19.
    Sander, T., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  20. 20.
    Wang, C., Hill, J., Knight, J., Davidson, J.: Software Tamper Resistance: Obstructing Static Analysis of Programs. Technical Report CS-2000-12, Dept. Computer science, University of Virginia, Charlottesville, VA, USA (2000)Google Scholar
  21. 21.
    Wang, C., Hill, J., Knight, J.C., Davidson, J.W.: Protection of Software-Based Survivability Mechanisms. In: DSN 2001: Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS), pp. 193–202. IEEE Computer Society, Los Alamitos (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Gisle Grimen
    • 1
  • Christian Mönch
    • 1
  • Roger Midtstraum
    • 1
  1. 1.Department of Computer and Information ScienceNorwegian University of Science and TechnologyNorway

Personalised recommendations