Abstract
Today, digital content is routinely distributed over the Internet, and consumed in devices based on open platforms. However, on open platforms users can run exploits, reconfigure the underlying operating system or simply mount replay attacks since the state of any (persistent) storage can easily be reset to some prior state. Faced with this difficulty, existing approaches to Digital Rights Management (DRM) are mainly based on preventing the copying of protected content thus protecting the needs of content providers. These inflexible mechanisms are not tenable in the long term since their restrictiveness prevents reasonable usage scenarios, and even honest users may be tempted to circumvent DRM systems.
In this paper we present a security architecture and the corresponding reference implementation that enables the secure usage and transfer of stateful licenses (and content) on a virtualized open platform. Our architecture allows for openness while protecting security objectives of both users (flexibility, fairer usage, and privacy) and content providers (license enforcement). In particular, it prevents replay attacks that is fundamental for secure management and distribution of stateful licenses. Our main objective is to show the feasibility of secure and fairer distribution and sharing of content and rights among different devices. Our implementation combines virtualization technology, a small security kernel, trusted computing functionality, and a legacy operating system (currently Linux).
Full version appears as a technical report HGI-TR-2007-002 in [24].
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Adelsbach, A., Sadeghi, A.-R., Rohe, M.: Towards multilateral secure digital rights distribution infrastructures. In: Proceedings of the ACM Workshop on Digital Rights Management (2005)
Apple Computer, Inc. FairPlay DRM, www.apple.com/itunes/
Asokan, N., Ekberg, J.-E.: Mobile digital rights management. In: Professional Mobile Internet Technical Architecture – Visions & Implementations (2002)
Aura, T., Gollmann, D.: Software license management with smart cards. In: Proceedings of the First USENIX Workshop on Smartcard Technology (1999)
Authentica, Inc. Authentica active rights management, www.authentica.com
Baek, K.-H., Smith, S.W.: Preventing theft of quality of service on open platforms. IEEE/CREATE-NET Workshop on Security and QoS in Communications Networks (September 2005)
Council, N.R.: The Digital Dilemma, Intellectual Property in the Information Age. National Academy Press, Washington, DC (2000)
Dierks, T., Allen, C.: RFC2246 - the TLS protocol version 1.0 (January 1999), www.ietf.org/rfc/rfc2246.txt
Epsilon Squared, Inc. InstallRite Version 2.5., www.epsilonsquared.com
Freitas, M., Roitzsch, M., Melanson, M., and Mattern, T.: The xine free multimedia player, www.xinehq.de
Hohmuth, M.: Linux-Emulation auf einem Mikrokern. Master’s thesis, Dresden University of Technology, Dept. of Computer Science (1996)
Koenen, R., Lacy, J., MacKay, M., Mitchell, S.: The long march to interoperable digital rights management. Proceedings of the IEEE 92(V) (2004)
Liedtke, J.: Towards real microkernels. Communications of the ACM 39 (September 1996)
Liu, Q., Safavi-Naini, R., Sheppard, N.P.: A license-sharing scheme in digital rights management. Tech. rep., Cooperative Research Centres - Smart Internet Technology, Australia (2004)
Marchesini, J., Smith, S., Wild, O., Barsamian, A., Stabiner, J.: Open-source applications of TCPA hardware. In: 20th Annual Computer Security Applications Conference (2004)
Marchesini, J., Smith, S.W., Wild, O., MacDonald, R.: Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear. Tech. Rep. TR2003-476, Dartmouth College (2003)
Microsoft Corporation. 60 days trial program, us1.trymicrosoftoffice.com
Microsoft Corporation. Windows media rights manager 10, www.microsoft.com/windows/windowsmedia/drm/default.aspx
Pfitzmann, B., Riordan, J., Stüble, C., Waidner, M., Weber, A.: The PERSEUS system architecture. Tech. Rep. RZ 3335 (#93381), IBM Research Division, Zurich Laboratory (April 2001)
Pruneda, A., Travis, J.: Metering the use of digital media content with Windows Media DRM 10, http://msdn.microsoft.com/library/en-us/dnwmt/html/meteringcontentusage10.asp
Robin, J.S., Irvine, C.E.: Analysis of the intel pentium’s ability to support a secure virtual machine monitor. In: Proceedings of the 9th USENIX Security Symposium (2000)
Russinovich, M.: Sony, rootkits and digital rights management gone too far (October 2005), http://blogs.technet.com/markrussinovich/
Sadeghi, A.-R., Stüble, C.: Property-based attestation for computing platforms: Caring about properties, not mechanisms. In: The New Security Paradigms Workshop (2004)
Sadeghi, A.-R., Wolf, M., Stüble, C., Asokan, N., Ekberg, J.-E.: Enabling Fairer Digital Rights Management with Trusted Computing. Tech. Rep. HGI-TR-2007-002, Horst-Görtz-Institute for IT-Security, Ruhr-University Bochum (June 2007)
Sailer, R., Valdez, E., Jaeger, T., Perez, R., van Doorn, L., Griffin, J.L., Berger, S.: sHype: Secure hypervisor approach to trusted virtualized systems. Tech. Rep. RC23511, IBM Research Division (2005)
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX Security Symposium (2004)
Shapiro, W., Vingralek, R.: How to manage persistent state in DRM systems. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, Springer, Heidelberg (2002)
Singaravelu, L., Pu, C., Helmuth, C., Härtig, H.: Reducing TCB complexity for security-sensitive applications: Three case studies. In: Eurosys Conference Proceedings, Leuven, Belgium (2006)
Starz Entertainment Group. Video on demand service, www.vongo.com
Tanenbaum, A.: Keynote at linux.conf.au (January 2007)
TCG Infrastructure Workgroup. Tcg infrastructure workgroup subject key attestation evidence extension specification version 1.0 revision 7
The Hymn Project. Free your iTunes Music Store purchases from their DRM restrictions (March 2007), www.hymn-project.org
The Register. DVD Jon hacks Media Player file encryption (October 2005), www.theregister.co.uk/2005/09/02/dvd_jon_mediaplayer/
TrouSerS. The open-source TCG software stack, trousers.sourceforge.net
Trusted Computing Group, www.trustedcomputinggroup.org
Trusted Computing Group. TPM main specification. Tech. rep., www.trustedcomputinggroup.org/specs/TPM/
Tygar, J., Yee, B.: Dyad: a system using physically secure coprocessors. In: Technological Strategies for Protecting Intellectual Property in the Networked Multimedia Environment (1994)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sadeghi, AR., Wolf, M., Stüble, C., Asokan, N., Ekberg, JE. (2007). Enabling Fairer Digital Rights Management with Trusted Computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds) Information Security. ISC 2007. Lecture Notes in Computer Science, vol 4779. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75496-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-75496-1_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75495-4
Online ISBN: 978-3-540-75496-1
eBook Packages: Computer ScienceComputer Science (R0)