Skip to main content

Protection of DRM Agent Codes

  • Conference paper
Advances in Multimedia Information Processing - PCM 2009 (PCM 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5879))

Included in the following conference series:

Abstract

In most existing digital rights management (DRM) technologies, the DRM agent, or DRM client, contains the content protection mechanisms applied to the system. However, the DRM agent that runs at the consumer side is often exposed to reverse engineering to compromise DRM agent or to obtain the secret license information kept at the DRM agent. In this paper, we propose an algorithm to protect against the reverse engineering of DRM agent codes and thus to protect the inside workings of the DRM agents. Our algorithm is based on self-modifying code and control flow flatten techniques. And after applying our algorithm, the agent software becomes hard to be analyzed by the attacker, which can be seen from the experimental results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sachan, A., Emmanuel, S., Das, A., Kankanhalli, M.S.: Privacy preserving multiparty multilevel drm architecture. In: Workshop on Digital Rights Management, 6th IEEE Consumer Communications and Networking Conference, pp. 1–5 (2009)

    Google Scholar 

  2. Thomas, T., Emmanuel, S., Das, A., Kankanhalli, M.: Secure multimedia content delivery with multiparty multilevel DRM architecture. In: Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video, pp. 85–90. ACM, New York (2009)

    Chapter  Google Scholar 

  3. Michiels, S., Verslype, K., Joosen, W., De Decker, B.: Towards a software architecture for DRM. In: Proceedings of the 5th ACM workshop on Digital rights management, pp. 65–74. ACM, New York (2005)

    Chapter  Google Scholar 

  4. Wang, C., Hill, J., Knight, J., Davidson, J.: Software tamper resistance: Obstructing static analysis of programs. University of Virginia, Charlottesville, VA (2000)

    Google Scholar 

  5. Ge, J., Chaudhuri, S., Tyagi, A.: Control flow based obfuscation. In: Proceedings of the 5th ACM workshop on Digital rights management, pp. 83–92. ACM, New York (2005)

    Chapter  Google Scholar 

  6. Popov, I., Debray, S., Andrews, G.: Binary obfuscation using signals. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium table of contents. USENIX Association, Berkeley (2007)

    Google Scholar 

  7. Madou, M., Anckaert, B., Moseley, P., Debray, S., De Sutter, B., De Bosschere, K.: Software Protection Through Dynamic Code Mutation. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 194–206. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  8. Kanzaki, Y., Monden, A., Nakamura, M., Matsumoto, K.: Exploiting self-modification mechanism for program protection. In: Proceedings of 27th Annual International Computer Software and Applications Conference, 2003. COMPSAC 2003, pp. 170–179 (2003)

    Google Scholar 

  9. Anckaert, B., Madou, M., De Bosschere, K.: A Model for Self-Modifying Code. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 232–248. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  10. Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 184–196. ACM, New York (1998)

    Chapter  Google Scholar 

  11. Majumdar, A., Thomborson, C.: Manufacturing opaque predicates in distributed systems for code obfuscation. In: Proceedings of the 29th Australasian Computer Science Conference, vol. 48, pp. 187–196. Australian Computer Society, Inc., Darlinghurst (2006)

    Google Scholar 

  12. Wang, C., Davidson, J., Hill, J., Knight, J.: Protection of Software-based Survivability Mechanisms. In: Proc. International Conference of Dependable Systems and Networks (July 2001)

    Google Scholar 

  13. Wang, C.: A Security Architecture for survivability Mechanisms. Phd thesis, Department of Computer Science, University of Virginia (October 2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liang, S., Emmanuel, S. (2009). Protection of DRM Agent Codes. In: Muneesawang, P., Wu, F., Kumazawa, I., Roeksabutr, A., Liao, M., Tang, X. (eds) Advances in Multimedia Information Processing - PCM 2009. PCM 2009. Lecture Notes in Computer Science, vol 5879. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10467-1_65

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10467-1_65

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10466-4

  • Online ISBN: 978-3-642-10467-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics