Skip to main content

Software-Based Copy Protection for Temporal Media During Dissemination and Playback

  • Conference paper
Information Security and Cryptology - ICISC 2005 (ICISC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3935))

Included in the following conference series:

  • 1440 Accesses

Abstract

We present a software-based protection mechanism to prevent unauthorized copying of media documents during their presentation on a clients host. Our solution enforces the execution and continuous replacement of security mechanisms on the clients host. Each protection mechanism is only used for a short time interval before it is replaced. The short duration of the time interval prevents a successful analysis and attack of the mechanism. In this way we solve a shortcoming of current solutions. As those employ fixed protection mechanisms they will eventually be circumvented because attackers have virtually unlimited time to analyze them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anckaert, B., De Sutter, B., Chanet, D., De Bosschere, K.: Steganography for executables and code transformation signatures. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 425–439. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Aucsmith, D.: Tamper Resistant Software: An Implementation. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 317–333. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  3. Camp, L.J.: Drm: doesn’t really mean digital copyright management. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 78–87. ACM Press, New York (2002)

    Google Scholar 

  4. Chang, H., Atallah, M.J.: Protecting Software Code by Guards. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 160–175. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Chen, Y., Venkatesan, R., Cary, M., Pang, R., Sinha, S., Jakubowski, M.H.: Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 400–414. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Chow, S., Gu, Y., Johnson, H., Zakharov, V.A.: An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 144–155. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Cohen, F.B.: Operating system protection through program evolution. Computers and Security 12(6), 565–584 (1993)

    Article  Google Scholar 

  8. Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation: tools for software protection. IEEE Trans. Softw. Eng. 28(8), 735–746 (2002)

    Article  Google Scholar 

  9. Collberg, C., Thomborson, C., Low, D.: Breaking Abstractions and Unstructuring Data Structures. In: ICCL 1998: Proceedings of the 1998 International Conference on Computer Languages, Washington, DC, USA, p. 28. IEEE Computer Society, Los Alamitos (1998)

    Google Scholar 

  10. Collberg, C., Thomborson, C., Low, D.: Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. In: Principles of Programming Languages 1998, POPL 1998, San Diego, CA (January 1998)

    Google Scholar 

  11. National Research Council. The Digital Dilemma - Intellectual Propert In The Information Age. Technical report, National Reasearch Council, USA (January 2000)

    Google Scholar 

  12. Hauser, T., Wenz, C.: DRM Under Attack: Weaknesses in Existing Systems. In: Becker, E., Buhse, W., Günnewig, D., Rump, N. (eds.) Digital Rights Management. LNCS, vol. 2770, pp. 206–223. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  13. Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  14. Horne, B., Matheson, L.R., Sheehan, C., Tarjan, R.E.: Dynamic Self-Checking Techniques for Improved Tamper Resistance. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 141–159. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  15. Huang, A.: Keeping Secrets in Hardware: The Microsoft XBox Case Study. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 213–227. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  16. Kocher, P., Jaffe, J., Jun, B., Laren, C., Lawson, N.: Self-Protecting Digital Content. Technical report, Cryptography Research Inc. (April 2003)

    Google Scholar 

  17. Ogiso, T., Sakabe, Y., Soshi, M., Miyaji, A.: Software tamper resistance based on the difficulty of interprocedural analysis. In: The Third International Workshop on Information Security Applications (WISA 2002), pp. 437–452 (August 2002)

    Google Scholar 

  18. Orlowski, A.: Itunes drm cracked wide open for gnu/linux, seriously. The Register (January 2004)

    Google Scholar 

  19. Sander, T., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  20. Wang, C., Hill, J., Knight, J., Davidson, J.: Software Tamper Resistance: Obstructing Static Analysis of Programs. Technical Report CS-2000-12, Dept. Computer science, University of Virginia, Charlottesville, VA, USA (2000)

    Google Scholar 

  21. Wang, C., Hill, J., Knight, J.C., Davidson, J.W.: Protection of Software-Based Survivability Mechanisms. In: DSN 2001: Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS), pp. 193–202. IEEE Computer Society, Los Alamitos (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Grimen, G., Mönch, C., Midtstraum, R. (2006). Software-Based Copy Protection for Temporal Media During Dissemination and Playback. In: Won, D.H., Kim, S. (eds) Information Security and Cryptology - ICISC 2005. ICISC 2005. Lecture Notes in Computer Science, vol 3935. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734727_29

Download citation

  • DOI: https://doi.org/10.1007/11734727_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33354-8

  • Online ISBN: 978-3-540-33355-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics