首页 > 最新文献

ACM Digital Rights Management Workshop最新文献

英文 中文
Fairer usage contracts for DRM 更公平的DRM使用合同
Pub Date : 2005-11-07 DOI: 10.1145/1102546.1102548
A. Arnab, A. Hutchison
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond the restrictions provided by copyright laws. In this paper we argue that DRM does not actually implement the fundamentals of copyright law, and is rather a mechanism for enforcing licence and contract restrictions on digital data. However, we believe that DRM does have a place in the digital distribution of copyrighted works and present two mechanisms that would allow users to get a more balanced deal from the rights holders. The mechanisms we present also allow for newer business models that cannot be easily implemented with current DRM systems.
DRM作为一种保护版权的手段被广泛推广。在之前的许多论文中,有人认为DRM给了版权所有者太多的权力,实际上超出了版权法提供的限制。在本文中,我们认为DRM实际上并没有实现版权法的基本原则,而是一种对数字数据实施许可和合同限制的机制。然而,我们相信DRM确实在版权作品的数字发行中占有一席之地,并提供了两种机制,使用户能够从版权所有者那里获得更平衡的交易。我们提出的机制还允许使用当前DRM系统无法轻松实现的新业务模型。
{"title":"Fairer usage contracts for DRM","authors":"A. Arnab, A. Hutchison","doi":"10.1145/1102546.1102548","DOIUrl":"https://doi.org/10.1145/1102546.1102548","url":null,"abstract":"DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond the restrictions provided by copyright laws. In this paper we argue that DRM does not actually implement the fundamentals of copyright law, and is rather a mechanism for enforcing licence and contract restrictions on digital data. However, we believe that DRM does have a place in the digital distribution of copyrighted works and present two mechanisms that would allow users to get a more balanced deal from the rights holders. The mechanisms we present also allow for newer business models that cannot be easily implemented with current DRM systems.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133403802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
New broadcast encryption scheme using tree-based circle 基于树状圈的广播加密新方案
Pub Date : 2005-11-07 DOI: 10.1145/1102546.1102554
Namsu Jho, Eun Sun Yoo, J. Cheon, Myung-Hwan Kim
Since broadcast encryption was first introduced in 1993 by Fiat and Naor, many broadcast encryption schemes have been developed. Among these, schemes based on tree structure and linear structure are notable. The subset difference (SD) scheme and layered subset difference (LSD) scheme based on tree structure have small user-key size and small transmission overhead when the number r of revoked users is very small. The punctured interval (PI) scheme based on linear (or circular) structure has better transmission overhead when r is not too small.In this paper, we propose a new broadcast encryption scheme, called the tree-based circle (TC) scheme, combining tree structure and circular structure. In this scheme, the transmission overhead is proportional to r like in the SD scheme for small r and becomes asymptotically same as that of the PI scheme when r grows, keeping the computation cost and the storage size small. The TC scheme also inherits the flexibility of the PI scheme. We further improve the transmission overhead of the TC scheme, when r is very small, by adopting the notion of cascade arc.
自从1993年Fiat和Naor首次引入广播加密以来,已经开发了许多广播加密方案。其中,基于树结构和线性结构的方案是值得注意的。基于树型结构的子集差分(SD)方案和分层子集差分(LSD)方案在撤销用户数量很小的情况下具有用户密钥大小小、传输开销小的优点。基于线性(或圆形)结构的穿刺间隔(PI)方案在r不太小时具有较好的传输开销。本文将树形结构与圆形结构相结合,提出了一种新的广播加密方案——基于树的圈(TC)加密方案。该方案与SD方案一样,在r较小时传输开销与r成正比,当r增大时传输开销与PI方案渐近相同,从而保持了较小的计算成本和存储容量。TC方案还继承了PI方案的灵活性。在r很小的情况下,采用串级弧的概念进一步改善了TC方案的传输开销。
{"title":"New broadcast encryption scheme using tree-based circle","authors":"Namsu Jho, Eun Sun Yoo, J. Cheon, Myung-Hwan Kim","doi":"10.1145/1102546.1102554","DOIUrl":"https://doi.org/10.1145/1102546.1102554","url":null,"abstract":"Since broadcast encryption was first introduced in 1993 by Fiat and Naor, many broadcast encryption schemes have been developed. Among these, schemes based on tree structure and linear structure are notable. The subset difference (SD) scheme and layered subset difference (LSD) scheme based on tree structure have small user-key size and small transmission overhead when the number r of revoked users is very small. The punctured interval (PI) scheme based on linear (or circular) structure has better transmission overhead when r is not too small.In this paper, we propose a new broadcast encryption scheme, called the tree-based circle (TC) scheme, combining tree structure and circular structure. In this scheme, the transmission overhead is proportional to r like in the SD scheme for small r and becomes asymptotically same as that of the PI scheme when r grows, keeping the computation cost and the storage size small. The TC scheme also inherits the flexibility of the PI scheme. We further improve the transmission overhead of the TC scheme, when r is very small, by adopting the notion of cascade arc.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128138066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards a software architecture for DRM 迈向DRM的软件架构
Pub Date : 2005-11-07 DOI: 10.1145/1102546.1102559
Sam Michiels, K. Verslype, W. Joosen, B. Decker
The domain of digital rights management (DRM) is currently lacking a generic architecture that supports interoperability and reuse of specific DRM technologies. This lack of architectural support is a serious drawback in light of the rapid evolution of a complex domain like DRM. It is highly unlikely that a single DRM technology or standard will be able to support the diversity of devices, users, platforms, and media, or the wide variety of system requirements concerning security, flexibility, and efficiency. This paper analyses state-of-the-art DRM technologies and extracts from them high level usage scenarios according to content consumers, producers, and publishers. In addition, the key services are identified both from a functional and security perspective. Identifying key DRM services and locating them in an overall structure brings us one step closer to a software architecture for DRM. Having available a software architecture should help the DRM community in reasoning about DRM systems, and in achieving reuse and interoperability of multiple domain-specific DRM technologies and standards.
数字版权管理(DRM)领域目前缺乏支持特定DRM技术的互操作性和重用的通用体系结构。考虑到像DRM这样的复杂领域的快速发展,缺乏体系结构支持是一个严重的缺点。单一的DRM技术或标准几乎不可能支持设备、用户、平台和媒体的多样性,也不可能支持与安全性、灵活性和效率相关的各种系统需求。本文分析了最新的DRM技术,并根据内容消费者、生产者和发布者的情况从中提取了高层次的使用场景。此外,从功能和安全的角度确定了关键服务。识别关键的DRM服务并将它们定位在一个整体结构中,使我们离DRM的软件体系结构又近了一步。拥有可用的软件体系结构应该有助于DRM社区对DRM系统进行推理,并实现多个特定于领域的DRM技术和标准的重用和互操作性。
{"title":"Towards a software architecture for DRM","authors":"Sam Michiels, K. Verslype, W. Joosen, B. Decker","doi":"10.1145/1102546.1102559","DOIUrl":"https://doi.org/10.1145/1102546.1102559","url":null,"abstract":"The domain of digital rights management (DRM) is currently lacking a generic architecture that supports interoperability and reuse of specific DRM technologies. This lack of architectural support is a serious drawback in light of the rapid evolution of a complex domain like DRM. It is highly unlikely that a single DRM technology or standard will be able to support the diversity of devices, users, platforms, and media, or the wide variety of system requirements concerning security, flexibility, and efficiency. This paper analyses state-of-the-art DRM technologies and extracts from them high level usage scenarios according to content consumers, producers, and publishers. In addition, the key services are identified both from a functional and security perspective. Identifying key DRM services and locating them in an overall structure brings us one step closer to a software architecture for DRM. Having available a software architecture should help the DRM community in reasoning about DRM systems, and in achieving reuse and interoperability of multiple domain-specific DRM technologies and standards.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114414365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Authorization for digital rights management in the geospatial domain 地理空间领域数字版权管理授权
Pub Date : 2005-11-07 DOI: 10.1145/1102546.1102557
A. Matheus
Since information is available in digital format, the protection of intellectual property and copyright fraud has become an important issue. This is, because the digital content can be copied without quality loss and with a reasonable effort of time, equipment and money. After copying, it can be distributed using the Internet, again with little effort of time and money. In such an environment, the loss of revenue for the music and film industry -- not only due to sites like Napster -- is becoming so tremendous, that mechanisms as described under the Digital Rights Management become important. In the geospatial domain, Spatial Data Infrastructures emerge that have the potential to provide high quality and up-to-date geographic information. This enables the endeavor of new market potentials and the creation of new business cases. However, the establishment of Digital Rights Management for geographic information is important in the first place. This paper introduces requirements for geospatial Digital Rights Management and illustrates the difference to known requirements for the music industry. The major contribution of this paper is the description of geospatial access control -- named GeoXACML -- as it can possibly be a solution to the authorization requirement for Digital Rights Management in the geospatial domain.
由于信息以数字形式提供,知识产权保护和版权欺诈已成为一个重要问题。这是因为数字内容可以在没有质量损失的情况下复制,而且只需要花费合理的时间、设备和金钱。在复制之后,它可以通过互联网发布,同样不需要花费多少时间和金钱。在这样的环境下,音乐和电影行业的收入损失——不仅仅是由于Napster这样的网站——变得如此巨大,以至于数字版权管理下描述的机制变得非常重要。在地理空间领域,出现了具有提供高质量和最新地理信息潜力的空间数据基础设施。这使得开发新的市场潜力和创建新的业务案例成为可能。然而,建立地理信息的数字版权管理制度是至关重要的。本文介绍了地理空间数字版权管理的需求,并说明了它与音乐行业已知需求的区别。本文的主要贡献是对地理空间访问控制的描述——命名为GeoXACML——因为它可能是地理空间领域数字版权管理授权需求的解决方案。
{"title":"Authorization for digital rights management in the geospatial domain","authors":"A. Matheus","doi":"10.1145/1102546.1102557","DOIUrl":"https://doi.org/10.1145/1102546.1102557","url":null,"abstract":"Since information is available in digital format, the protection of intellectual property and copyright fraud has become an important issue. This is, because the digital content can be copied without quality loss and with a reasonable effort of time, equipment and money. After copying, it can be distributed using the Internet, again with little effort of time and money. In such an environment, the loss of revenue for the music and film industry -- not only due to sites like Napster -- is becoming so tremendous, that mechanisms as described under the Digital Rights Management become important. In the geospatial domain, Spatial Data Infrastructures emerge that have the potential to provide high quality and up-to-date geographic information. This enables the endeavor of new market potentials and the creation of new business cases. However, the establishment of Digital Rights Management for geographic information is important in the first place. This paper introduces requirements for geospatial Digital Rights Management and illustrates the difference to known requirements for the music industry. The major contribution of this paper is the description of geospatial access control -- named GeoXACML -- as it can possibly be a solution to the authorization requirement for Digital Rights Management in the geospatial domain.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123670465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A DRM security architecture for home networks 家庭网络的DRM安全架构
Pub Date : 2004-10-25 DOI: 10.1145/1029146.1029150
B. Popescu, B. Crispo, A. Tanenbaum, F. Kamperman
This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establish dynamic groups, so called "Authorized Domains", where legally acquired copyrighted content can seamlessly move from device to device. This greatly improves the end-user experience, preserves "fair use" expectations, and enables the development of new business models by content providers. Key to our design is a hybrid compliance checking and group establishment protocol, based on pre-distributed symmetric keys, with minimal reliance on public key cryptographic operations. Our architecture does not require continuous network connectivity between devices, and allows for efficient and flexible key updating and revocation.
本文描述了一种允许在由消费电子设备组成的家庭网络中进行数字权限管理的安全体系结构。这个想法是允许设备建立动态组,也就是所谓的“授权域”,在那里合法获得的版权内容可以无缝地从一个设备转移到另一个设备。这极大地改善了终端用户的体验,保持了“合理使用”的期望,并使内容提供商能够开发新的业务模式。我们设计的关键是混合合规性检查和组建立协议,该协议基于预分布式对称密钥,对公钥加密操作的依赖最小。我们的架构不需要设备之间的连续网络连接,并且允许高效灵活的密钥更新和撤销。
{"title":"A DRM security architecture for home networks","authors":"B. Popescu, B. Crispo, A. Tanenbaum, F. Kamperman","doi":"10.1145/1029146.1029150","DOIUrl":"https://doi.org/10.1145/1029146.1029150","url":null,"abstract":"This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establish dynamic groups, so called \"Authorized Domains\", where legally acquired copyrighted content can seamlessly move from device to device. This greatly improves the end-user experience, preserves \"fair use\" expectations, and enables the development of new business models by content providers. Key to our design is a hybrid compliance checking and group establishment protocol, based on pre-distributed symmetric keys, with minimal reliance on public key cryptographic operations. Our architecture does not require continuous network connectivity between devices, and allows for efficient and flexible key updating and revocation.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127728533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 112
Tamper detection and localization for categorical data using fragile watermarks 基于脆弱水印的分类数据篡改检测与定位
Pub Date : 2004-10-25 DOI: 10.1145/1029146.1029159
K. Rajanala, Huiping Guo, Chengyu Sun
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In this paper, we propose to make use of fragile watermarks to detect and localize malicious alterations made to a database relation with categorical attributes. Unlike other watermarking schemes which inevitably introduce distortions to the cover data, the proposed scheme is distortion free. In our algorithm, all tuples in a database relation are first securely divided into groups according to some secure parameters. Watermarks are embedded and verified in each group independently. Thus, any modifications can be localized to some specific groups. Theoretical analysis shows that the probability of missing detection is very low.
今天,数据库关系在Internet上得到了广泛的应用和分布。由于这些数据很容易被篡改,因此确保这些数据的完整性至关重要。在本文中,我们提出利用脆弱水印来检测和定位对具有分类属性的数据库关系所做的恶意更改。与其他不可避免地对覆盖数据引入失真的水印方案不同,该方案是无失真的。在我们的算法中,首先根据一些安全参数将数据库关系中的所有元组安全地划分为组。水印在每一组中独立嵌入和验证。因此,任何修改都可以定位到某些特定的组。理论分析表明,缺失检测的概率很低。
{"title":"Tamper detection and localization for categorical data using fragile watermarks","authors":"K. Rajanala, Huiping Guo, Chengyu Sun","doi":"10.1145/1029146.1029159","DOIUrl":"https://doi.org/10.1145/1029146.1029159","url":null,"abstract":"Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In this paper, we propose to make use of fragile watermarks to detect and localize malicious alterations made to a database relation with categorical attributes. Unlike other watermarking schemes which inevitably introduce distortions to the cover data, the proposed scheme is distortion free. In our algorithm, all tuples in a database relation are first securely divided into groups according to some secure parameters. Watermarks are embedded and verified in each group independently. Thus, any modifications can be localized to some specific groups. Theoretical analysis shows that the probability of missing detection is very low.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127749246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 121
Attacks and risk analysis for hardware supported software copy protection systems 硬件支持的软件复制保护系统的攻击和风险分析
Pub Date : 2004-10-25 DOI: 10.1145/1029146.1029156
Wei-qi Shi, H. Lee, Chenghuai Lu, Zhang Tao
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a specially tailored secure processor to prevent, 1) illegal software duplication, 2) unauthorized software modification, and 3)unauthorized software reverse engineering. The published techniques primarily focused on feasibility demonstration and design details rather than analyzing security risks and potential attacks from an adversary's perspective. The uniqueness of software copy protection may lead to some potential attacks on such a secure environment that have been largely ignored or insufficiently addressed in the literature. One should not take security for granted just because it is implemented on a tamper-resistant secure processor. Detailed analysis on some proposed ideas reveal potential vulnerability and attacks. Some of the attacks are known to the security community, nevertheless, their implications to software copy protection are not well understood and discussed. This paper presents these cases for designers to improve their systems and circumvent the potential security pitfalls and for users of such systems to be aware of the potential risks
最近,研究团体对使用防篡改处理器来保护软件拷贝越来越感兴趣。许多这些防篡改系统依赖于专门定制的安全处理器来防止,1)非法软件复制,2)未经授权的软件修改,以及3)未经授权的软件逆向工程。公开的技术主要关注可行性论证和设计细节,而不是从对手的角度分析安全风险和潜在攻击。软件复制保护的独特性可能会导致对这样一个安全环境的一些潜在攻击,这些攻击在很大程度上被忽视或在文献中没有充分解决。人们不应该仅仅因为在防篡改安全处理器上实现了安全性就认为它是理所当然的。对提出的一些想法进行详细分析,揭示了潜在的漏洞和攻击。一些攻击为安全社区所知,然而,它们对软件复制保护的影响并没有得到很好的理解和讨论。本文为设计人员提供了这些案例,以改进他们的系统并规避潜在的安全隐患,并为这些系统的用户提供了潜在风险的意识
{"title":"Attacks and risk analysis for hardware supported software copy protection systems","authors":"Wei-qi Shi, H. Lee, Chenghuai Lu, Zhang Tao","doi":"10.1145/1029146.1029156","DOIUrl":"https://doi.org/10.1145/1029146.1029156","url":null,"abstract":"<i>Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a specially tailored secure processor to prevent, 1) illegal software duplication, 2) unauthorized software modification, and 3)unauthorized software reverse engineering. The published techniques primarily focused on feasibility demonstration and design details rather than analyzing security risks and potential attacks from an adversary's perspective. The uniqueness of software copy protection may lead to some potential attacks on such a secure environment that have been largely ignored or insufficiently addressed in the literature. One should not take security for granted just because it is implemented on a tamper-resistant secure processor. Detailed analysis on some proposed ideas reveal potential vulnerability and attacks. Some of the attacks are known to the security community, nevertheless, their implications to software copy protection are not well understood and discussed. This paper presents these cases for designers to improve their systems and circumvent the potential security pitfalls and for users of such systems to be aware of the potential risks</i>","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126182593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On the implications of machine virtualization for DRM and fair use: a case study of a virtual audio device driver 关于机器虚拟化对DRM和合理使用的影响:一个虚拟音频设备驱动程序的案例研究
Pub Date : 2004-10-25 DOI: 10.1145/1029146.1029162
Ninad Ghodke, R. Figueiredo
This paper examines the architecture of present day systems and shows that they are not trustworthy enough to support certain DRM features/restrictions, even when the DRM delivery system exclusively utilizes signed and protected operating system components. This weakness was discovered while creating a technique for remote transfer of audio streams generated by a Virtual Machine Monitor (VMM), to achieve network transparency for audio devices. The technique is based on the implementation of hosted I/O VMMs that intercept device I/O instructions executed by a "guest" O/S and emulate them through system calls processed by device drivers of a "host" O/S. The design consists of a virtual audio device driver that forwards sound streams to a user-level network server. Because (1) the virtual device intercepts audio data in an unprotected format (WAV), regardless of which application and file format are in use by the guest O/S, (2) modern virtual machine-based systems already achieve performance levels that allow for real-time audio playback, the playback only model of service/restriction imposed by some content delivery businesses is rendered ineffective by this technique. It enables Fair Use of DRM enabled media by allowing the user to make a copy of legally purchased audio media and time-shifting of Internet Radio stations. Experiments have shown that audibly perfect copies of media played by a VM "guest" can be made in PCM/WAV format, even though DRM-enabling features are present in the "guest" O/S drivers and media players. This paper also draws attention to the fact that the VM should be considered while designing the security and DRM capabilities in future general-purpose systems since a device driver in between the VMM and the host O/S has the potential of being an eavesdropper and a malicious end user.
本文检查了当前系统的体系结构,并表明它们不足以支持某些DRM特性/限制,即使DRM交付系统专门使用签名和受保护的操作系统组件。这个弱点是在创建远程传输由虚拟机监视器(VMM)生成的音频流的技术时发现的,该技术旨在实现音频设备的网络透明性。该技术基于托管I/O vmm的实现,它拦截由“来宾”O/S执行的设备I/O指令,并通过由“主机”O/S的设备驱动程序处理的系统调用来模拟它们。该设计由一个虚拟音频设备驱动程序组成,该驱动程序将声音流转发到用户级网络服务器。因为(1)虚拟设备以不受保护的格式(WAV)拦截音频数据,而不管客户O/S使用的是哪种应用程序和文件格式;(2)现代基于虚拟机的系统已经达到了允许实时音频回放的性能水平,一些内容交付业务强加的仅播放服务/限制模型由于这种技术而变得无效。它允许用户复制合法购买的音频媒体和互联网广播电台的时移,从而实现了DRM媒体的合理使用。实验表明,即使在“来宾”O/S驱动程序和媒体播放器中存在支持drm的功能,也可以用PCM/WAV格式制作由虚拟机“来宾”播放的媒体的完美声音拷贝。本文还提请注意这样一个事实,即在设计未来通用系统的安全性和DRM功能时应考虑VM,因为VMM和主机O/S之间的设备驱动程序有可能成为窃听者和恶意最终用户。
{"title":"On the implications of machine virtualization for DRM and fair use: a case study of a virtual audio device driver","authors":"Ninad Ghodke, R. Figueiredo","doi":"10.1145/1029146.1029162","DOIUrl":"https://doi.org/10.1145/1029146.1029162","url":null,"abstract":"This paper examines the architecture of present day systems and shows that they are not trustworthy enough to support certain DRM features/restrictions, even when the DRM delivery system exclusively utilizes signed and protected operating system components. This weakness was discovered while creating a technique for remote transfer of audio streams generated by a Virtual Machine Monitor (VMM), to achieve network transparency for audio devices. The technique is based on the implementation of hosted I/O VMMs that intercept device I/O instructions executed by a \"guest\" O/S and emulate them through system calls processed by device drivers of a \"host\" O/S. The design consists of a virtual audio device driver that forwards sound streams to a user-level network server. Because (1) the virtual device intercepts audio data in an unprotected format (WAV), regardless of which application and file format are in use by the guest O/S, (2) modern virtual machine-based systems already achieve performance levels that allow for real-time audio playback, the playback only model of service/restriction imposed by some content delivery businesses is rendered ineffective by this technique. It enables Fair Use of DRM enabled media by allowing the user to make a copy of legally purchased audio media and time-shifting of Internet Radio stations. Experiments have shown that audibly perfect copies of media played by a VM \"guest\" can be made in PCM/WAV format, even though DRM-enabling features are present in the \"guest\" O/S drivers and media players. This paper also draws attention to the fact that the VM should be considered while designing the security and DRM capabilities in future general-purpose systems since a device driver in between the VMM and the host O/S has the potential of being an eavesdropper and a malicious end user.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128572094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Software piracy prevention through diversity 通过多样性预防软件盗版
Pub Date : 2004-10-25 DOI: 10.1145/1029146.1029157
Bertrand Anckaert, B. D. Sutter, K. D. Bosschere
Software piracy is a major concern for software providers, despite the many defense mechanisms that have been proposed to prevent it. This paper identifies the fundamental weaknesses of existing approaches, resulting from the static nature of defense and the impossibility to prevent the duplication of digital data. A new scheme is presented that enables a more dynamic nature of defense and makes it harder to create an additional, equally useful copy. Furthermore it enables a fine-grained control over the distributed software. Its strength is based on diversity: each installed copy is unique and updates are tailored to work for one installed copy only.
软件盗版是软件供应商主要关心的问题,尽管已经提出了许多防御机制来防止盗版。本文指出了现有方法的根本弱点,这些弱点是由于防御的静态性质和无法防止数字数据的重复造成的。提出了一种新的方案,使防御更具动态性,并使创建额外的,同样有用的副本变得更加困难。此外,它支持对分布式软件进行细粒度控制。它的优势是基于多样性:每个安装的副本都是独一无二的,更新只针对一个安装的副本进行定制。
{"title":"Software piracy prevention through diversity","authors":"Bertrand Anckaert, B. D. Sutter, K. D. Bosschere","doi":"10.1145/1029146.1029157","DOIUrl":"https://doi.org/10.1145/1029146.1029157","url":null,"abstract":"Software piracy is a major concern for software providers, despite the many defense mechanisms that have been proposed to prevent it. This paper identifies the fundamental weaknesses of existing approaches, resulting from the static nature of defense and the impossibility to prevent the duplication of digital data. A new scheme is presented that enables a more dynamic nature of defense and makes it harder to create an additional, equally useful copy. Furthermore it enables a fine-grained control over the distributed software. Its strength is based on diversity: each installed copy is unique and updates are tailored to work for one installed copy only.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123840361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Reconfigurable hardware solutions for the digital rights management of digital cinema 面向数字影院数字版权管理的可重构硬件解决方案
Pub Date : 2004-10-25 DOI: 10.1145/1029146.1029147
G. Rouvroy, François-Xavier Standaert, F. Lefèbvre, J. Quisquater, B. Macq, J. Legat
This paper presents a hardware implementation of a decoder for Digital Cinema images. This decoder enables us to deal with image size of 2K with 24 frames per second and 36 bits per pixels. It is the first implementation known nowadays that perfectly fits in one single Virtex-II® FPGA and includes AES decryption, JPEG 2000 decompression and fingerprinting blocks. This hardware offers therefore high-quality image processing as well as robust security.
本文介绍了一种数字电影图像解码器的硬件实现。这个解码器使我们能够以每秒24帧和每像素36比特的速度处理2K的图像大小。这是目前已知的第一个完全适合单个Virtex-II®FPGA的实现,包括AES解密,JPEG 2000解压缩和指纹识别块。因此,这种硬件提供了高质量的图像处理以及强大的安全性。
{"title":"Reconfigurable hardware solutions for the digital rights management of digital cinema","authors":"G. Rouvroy, François-Xavier Standaert, F. Lefèbvre, J. Quisquater, B. Macq, J. Legat","doi":"10.1145/1029146.1029147","DOIUrl":"https://doi.org/10.1145/1029146.1029147","url":null,"abstract":"This paper presents a hardware implementation of a decoder for Digital Cinema images. This decoder enables us to deal with image size of 2K with 24 frames per second and 36 bits per pixels. It is the first implementation known nowadays that perfectly fits in one single Virtex-II® FPGA and includes AES decryption, JPEG 2000 decompression and fingerprinting blocks. This hardware offers therefore high-quality image processing as well as robust security.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123719855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
ACM Digital Rights Management Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1