Abstract
We present a software-based protection mechanism to prevent unauthorized copying of media documents during their presentation on a clients host. Our solution enforces the execution and continuous replacement of security mechanisms on the clients host. Each protection mechanism is only used for a short time interval before it is replaced. The short duration of the time interval prevents a successful analysis and attack of the mechanism. In this way we solve a shortcoming of current solutions. As those employ fixed protection mechanisms they will eventually be circumvented because attackers have virtually unlimited time to analyze them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anckaert, B., De Sutter, B., Chanet, D., De Bosschere, K.: Steganography for executables and code transformation signatures. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 425–439. Springer, Heidelberg (2005)
Aucsmith, D.: Tamper Resistant Software: An Implementation. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 317–333. Springer, Heidelberg (1996)
Camp, L.J.: Drm: doesn’t really mean digital copyright management. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 78–87. ACM Press, New York (2002)
Chang, H., Atallah, M.J.: Protecting Software Code by Guards. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 160–175. Springer, Heidelberg (2002)
Chen, Y., Venkatesan, R., Cary, M., Pang, R., Sinha, S., Jakubowski, M.H.: Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 400–414. Springer, Heidelberg (2003)
Chow, S., Gu, Y., Johnson, H., Zakharov, V.A.: An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 144–155. Springer, Heidelberg (2001)
Cohen, F.B.: Operating system protection through program evolution. Computers and Security 12(6), 565–584 (1993)
Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation: tools for software protection. IEEE Trans. Softw. Eng. 28(8), 735–746 (2002)
Collberg, C., Thomborson, C., Low, D.: Breaking Abstractions and Unstructuring Data Structures. In: ICCL 1998: Proceedings of the 1998 International Conference on Computer Languages, Washington, DC, USA, p. 28. IEEE Computer Society, Los Alamitos (1998)
Collberg, C., Thomborson, C., Low, D.: Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. In: Principles of Programming Languages 1998, POPL 1998, San Diego, CA (January 1998)
National Research Council. The Digital Dilemma - Intellectual Propert In The Information Age. Technical report, National Reasearch Council, USA (January 2000)
Hauser, T., Wenz, C.: DRM Under Attack: Weaknesses in Existing Systems. In: Becker, E., Buhse, W., Günnewig, D., Rump, N. (eds.) Digital Rights Management. LNCS, vol. 2770, pp. 206–223. Springer, Heidelberg (2003)
Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)
Horne, B., Matheson, L.R., Sheehan, C., Tarjan, R.E.: Dynamic Self-Checking Techniques for Improved Tamper Resistance. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 141–159. Springer, Heidelberg (2002)
Huang, A.: Keeping Secrets in Hardware: The Microsoft XBox Case Study. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 213–227. Springer, Heidelberg (2003)
Kocher, P., Jaffe, J., Jun, B., Laren, C., Lawson, N.: Self-Protecting Digital Content. Technical report, Cryptography Research Inc. (April 2003)
Ogiso, T., Sakabe, Y., Soshi, M., Miyaji, A.: Software tamper resistance based on the difficulty of interprocedural analysis. In: The Third International Workshop on Information Security Applications (WISA 2002), pp. 437–452 (August 2002)
Orlowski, A.: Itunes drm cracked wide open for gnu/linux, seriously. The Register (January 2004)
Sander, T., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)
Wang, C., Hill, J., Knight, J., Davidson, J.: Software Tamper Resistance: Obstructing Static Analysis of Programs. Technical Report CS-2000-12, Dept. Computer science, University of Virginia, Charlottesville, VA, USA (2000)
Wang, C., Hill, J., Knight, J.C., Davidson, J.W.: Protection of Software-Based Survivability Mechanisms. In: DSN 2001: Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS), pp. 193–202. IEEE Computer Society, Los Alamitos (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Grimen, G., Mönch, C., Midtstraum, R. (2006). Software-Based Copy Protection for Temporal Media During Dissemination and Playback. In: Won, D.H., Kim, S. (eds) Information Security and Cryptology - ICISC 2005. ICISC 2005. Lecture Notes in Computer Science, vol 3935. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734727_29
Download citation
DOI: https://doi.org/10.1007/11734727_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33354-8
Online ISBN: 978-3-540-33355-5
eBook Packages: Computer ScienceComputer Science (R0)