Abstract
DRM systems are insecure. This statement seems to be too simple. But like all simplifications it has a true background: Every piece of software is breakable. This chapter shows what possibilities an unfriendly intruder has and which leaks DRM systems must close in consequence. We cover audio and video protection mechanisms as well as eBooks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Hauser, T., Wenz, C. (2003). DRM Under Attack: Weaknesses in Existing Systems. In: Becker, E., Buhse, W., Günnewig, D., Rump, N. (eds) Digital Rights Management. Lecture Notes in Computer Science, vol 2770. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10941270_14
Download citation
DOI: https://doi.org/10.1007/10941270_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40465-1
Online ISBN: 978-3-540-45038-2
eBook Packages: Springer Book Archive