Abstract
Due to severe DRM failures and the urgent demand for a better solution to solve the existing DRM systems vulnerabilities, this paper discusses the current DRM status, stressing system security objectives and requirements. Based on the analysis of the developed DRM solutions and emerging state of the art DRM technologies, this paper attempts to account for the causes of DRM failures and proposes a novel DRM security paradigm. We present an experimental DRM architectural rework aiming to cope with the existing limitations and weaknesses by using novel technological breakthroughs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Patriviu, V., Bica, I., Togan, M., Ghita, S.: A Generalized DRM Architectural Framework. In: Advances in Electrical and Computer Engineering, pp. 43–48 (2011) ISSN: 1582-7445
OMA-DRM 2.0, Open Mobile Alliance Digital Rights Management (2012), http://www.openmobilealliance.org
IETF DRM procedings Working Group, http://www.ietf.org/ , MPEG-4 IPMP-x, Specific DRM solution by the MPEG-4 (2012), http://www.mpeg.org
ISMA Cryp 2.0, Internet Media Streaming Alliance Encryption & Authentication Specification 2.0 (2012), http://www.isma.tv/spec-request.html
Arnab, A., Hutchison, A.: A Requirement Analysis of Enterprise DRM Systems. In: ISSA, Johannesburg, South Africa (2005)
Liu, Q., Safavi-Naini, R., Sheppard, N.P.: Digital rights management for content distribution. In: ACSW 2003, Proceedings of the First Australasian Information Security Workshop (2003)
OMA-ODRL 2.0, Open Mobile Alliance Open Digital Rights Language, http://odrl.net/
XrML 2.0, eXtensible Rights Markup Language (2012), http://www.xrml.org
Billet, O., Gilbert, H., Ech-Chatbi, C.: Cryptanalysis of a White Box AES Implementation. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 227–240. Springer, Heidelberg (2004)
Wyseur, B., Michiels, W., Gorissen, P., Preneel, B.: Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 264–277. Springer, Heidelberg (2007)
Michiels, W., Gorissen, P., Hollmann, H.D.L.: Cryptanalysis of a Generic Class of White-Box Implementations. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 414–428. Springer, Heidelberg (2009)
Bruce, S.: Crypto-Gram blog post, The Futility of Digital Copy Prevention (2001), http://www.schneier.com/crypto-gram-0105.html#3
JADE 4.1.1, Java Agent DEvelopment Framework (2012), http://jade.tilab.com/
Ping, L., Zhengding, L., Fuhao, Z., Hefei, L.: A DRM System Based on Mobile Agent for Digital Rights Redistribution. Wuhan University Journal of Natural Sciences 13(4), 475–480 (2008), doi:10.1007/s11859-008-0419-3
Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)
Ametller, J., Robles, S., Ortega-Ruiz, J.A.: Self Protected Mobile Agents. In: Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2004, NY, USA, pp. 362–367 (2004) ISBN: 1-58113-864-4
Basit, H., Pugliesi, S., Smyth, W., Turpin, A., Jarzabek, S.: Efficient Token Based Clone Detection with Flexible Tokenization. In: ESEC/FSE, pp. 513–515 (2007)
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001)
Collberg, C.S., Thomborson, C.: Watermarking, tamper-proffing, and obfuscation: tools for software protection. IEEE Transactions on Software Engineering 28(8), 735–746 (2002)
Armoogum, S., Asvin, C.: Obfuscation Techniques for Mobile Agent code confidentiality. Journal of Information & Systems Management 1(1), 83–94 (2011) ISSN: 0976-2930
DashO Java Obfuscator (2012), http://www.preemptive.com/products/dasho/
KlassMaster Java Obfuscator (2012), http://www.zelix.com/klassmaster/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ghita, SV., Patriciu, VV., Bica, I. (2012). Experimental DRM Model Using Mobile Code and White-Box Encryption. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-34135-9_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34134-2
Online ISBN: 978-3-642-34135-9
eBook Packages: Computer ScienceComputer Science (R0)