skip to main content
10.1145/2108616.2108688acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Security analysis on commercial online music streaming service and countermeasures

Authors Info & Claims
Published:14 January 2010Publication History

ABSTRACT

Nowadays, the music industry is moving from analog to digital. Most of the big portal sites provide commercial online music streaming services. In this paper, we analyzed the security of the Korean commercial online music streaming services which are provided by the Korea's major portal sites(Dosirak, Cyworld, and Naver). We will show attacks on commercial online music streaming services that lead to an infringement of the copyright and we will also propose countermeasures for online commercial music streaming services.

References

  1. Jinho Jung, "musicians are crying...", I-News, 2007.9.28.Google ScholarGoogle Scholar
  2. Cyworld Music, "http://music.cyworld.com/"Google ScholarGoogle Scholar
  3. Naver Music, "http://music.naver.com/"Google ScholarGoogle Scholar
  4. Dosirak, "http://www.dosirak.com/"Google ScholarGoogle Scholar
  5. Fiddler, "http://www.fiddlertool.com/fiddler/".Google ScholarGoogle Scholar
  6. Cooxie, "http://www.diodia.com/cooxietoolbar.htm/".Google ScholarGoogle Scholar
  7. Burp suit, "http://portswigger.net/"Google ScholarGoogle Scholar
  8. Wikipedia, "http://www.wikipedia.org"Google ScholarGoogle Scholar
  9. Mike Andrews, James A. Whittaker, "How to break web software", Addison-Wesley Professional (February 12, 2006).Google ScholarGoogle Scholar
  10. Hye-Young Chang, Seong-Je Cho, "Implementation of an Obfuscator for Visual C++ Source Code", The Journal of the KICS (Korean Institute of Communication Sciences), Vol. 35/No.2, pp. 59--67, 2008. 2Google ScholarGoogle Scholar

Index Terms

  1. Security analysis on commercial online music streaming service and countermeasures

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
          January 2010
          550 pages
          ISBN:9781605588933
          DOI:10.1145/2108616

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 January 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate251of941submissions,27%
        • Article Metrics

          • Downloads (Last 12 months)9
          • Downloads (Last 6 weeks)2

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader