Skip to main content

Inhibiting Card Sharing Attacks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4266))

Abstract

The satellite TV industry relies heavily on the use of smart card technology at the very heart of broadcasted services that are protected by legacy conditional access systems. The process of Satellite TV signal protection is distributed amongst a number of system components, e.g. smart cards, receivers, Conditional Access Modules (CAM) and the content provider. However, the introduction of “Open” Satellite Receivers, providing a highly configurable environment with software emulation of conditional access systems, enabled the implementation of whole range of new attacks. A widely deployed attack is often referred to as the “card sharing” attack, by which one legitimate user colludes to provide protected content to a larger group of unauthorised users. This paper proposes a countermeasure that increases the bandwidth requirements of this attack to the point where it is no longer practical with a standard internet connection, with a minimal impact on existing protocols and architectures.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ETR 154: Digital video broadcasting (DVB): Implementation guidelines for the use of MPEG-2 systems; video and audio in satellite, cable and terrestrial broadcasting applications

    Google Scholar 

  2. Anonymous. CSA – known facts and speculations, http://CSA.irde.to

  3. MultiMediaCard Association, http://www.mmca.org

  4. MultiMediaCard Association. Application note, an0501-1.00 (April 2005), http://www.mmca.org/compliance/buy_spec/AN_MMCA050419.pdf

  5. EBU Project Group B/CA. Functional model of a conditional access system. EBU technical Review, Winter (1995)

    Google Scholar 

  6. CENELEC. Common interface specification for conditional access and other digital video broadcasting decoder applications. Technical Report CENELEC Standard 50221, European Committee for Electrotechnical Standardization (CENELEC), Brussels, Belgium (February 1997)

    Google Scholar 

  7. Chachiere, V.: Man ordered to pay $180m restitution for TV signal piracy. Naples Daily News, http://www.naplesnews.com

  8. Cryptoworks, http://www.digitalnetworks.philips.com

  9. Cutts, D.J.: DVB conditional access. IEE Electronics and Communications Engineering Journal 9(1), 21–27 (1997)

    Article  Google Scholar 

  10. Giesecke, Devrient: Secure and mobile storage media – the memory card with smart card technology (2005), http://www.gi-de.com/

  11. ETSI. Digital video broadcasting (DVB); support for use of scrambling and conditional access (CA) within digital broadcasting systems. Technical Report ETSI Technical Report ETR 289, European Telecommunications Standards Institute (ETSI), Sophia Antipolis, France (October 1996)

    Google Scholar 

  12. Gemplus. Cryptomotion. In: Cartes 2003 (2003), review available at: http://www.prnewswire.co.uk/cgi/news/release?id=112260

  13. Guillou, L.C.: Smart cards and conditional access. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 480–489. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  14. helpwithpcs.com. Internet connections explained, a guide to dial-up, adsl and cable connections, http://www.helpwithpcs.com/internet/internet-connections.htm#adsl-connections

  15. Hewitt, R.: North american MPEG-2 information (July 2003), http://www.coolstf.com/mpeg

  16. Holankar, D., Stamp, M.: Secure streaming media and digital rights management. In: Proceedings of the 2004 Hawaii International Conference on Computer Science, pp. 85–96. ACM Press, New York (2004)

    Google Scholar 

  17. Irdeto, http://www.irdetoaccess.com

  18. Kalina, P.: No-pay TV costs industry $50m. The Age Journal, http://www.theage.com.um

  19. Kravitz, D.W., Goldschlag, D.M.: Conditional access concepts and principles. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol. 1648, pp. 158–172. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  20. Kuhn, M.: Attack on pay-tv access control systems. Security Seminar talk, University of Cambridge, London (1997)

    Google Scholar 

  21. Langelaar, G.C.: Overview of protection methods in existing TV and storage devices. Technical University of Delft (July 1996)

    Google Scholar 

  22. McCormac, J.: European scrambling system. Waterford University Press (1996)

    Google Scholar 

  23. International Standards Organisation. ISO7816–3 smart card standard: Part 3: Electronic signals and transmission protocols

    Google Scholar 

  24. Praca, D.: Next generation smart card: New features, new architecture and system integration. In: 6th e-Smart Conference, Sophia Antipolis, France (September 2005)

    Google Scholar 

  25. Praca, D., Barral, C.: From smart cards to smart objects: The road to new smart card technologies. Computer networks 36(4), 381–389 (2001)

    Article  Google Scholar 

  26. Seca, http://www.securityit.com

  27. STmicroelectronics. Smartcard solutions ST19 multi-application smartcard ICs, http://www.st.com

  28. STmicroelectronics. STmicroelectronics delivers world’s first USB-certified smart card chips (2002), http://www.st.com

  29. VIAccess, http://www.viaccess.com

  30. Dream Multimedia Worldwide. Dreambox DM7000s user manual, http://www.dream-multimedia-tv.de/manual/manual_eng.zip

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tunstall, M., Markantonakis, K., Mayes, K. (2006). Inhibiting Card Sharing Attacks. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S. (eds) Advances in Information and Computer Security. IWSEC 2006. Lecture Notes in Computer Science, vol 4266. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11908739_17

Download citation

  • DOI: https://doi.org/10.1007/11908739_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-47699-3

  • Online ISBN: 978-3-540-47700-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics