以打印机墨盒为例,实现硬件DRM保护的方法和操作

IF 0.2 Q4 ENGINEERING, GEOLOGICAL Archives for Technical Sciences Pub Date : 2022-09-05 DOI:10.31648/ts.7634
Wojciech Cybowski
{"title":"以打印机墨盒为例,实现硬件DRM保护的方法和操作","authors":"Wojciech Cybowski","doi":"10.31648/ts.7634","DOIUrl":null,"url":null,"abstract":"The subject of this paper is to analyze the way of implementation and operation of hardware DRM protection systems on the example of selected printer cartridges. Thanks to the analysis, it is possible to understand the way of operation of typical security chips used in printer cartridges. Using the knowledge gained, it becomes possible to modify the data on the security chips and thus reset the protection, so that the printer sees the chip with the modified data as a new one. However, the process itself was difficult due to the lack of publicly available materials on this topic. In this paper, different approaches to DRM security analysis have been used, so that the reader can try to perform the described steps to analyze other hardware DRM systems by himself. In addition, devices called resetters have been designed and fabricated to quickly reset the analyzed security chips. Their design and documentation is available on the author's Github.","PeriodicalId":41669,"journal":{"name":"Archives for Technical Sciences","volume":null,"pages":null},"PeriodicalIF":0.2000,"publicationDate":"2022-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Methods of implementation and operation of hardware DRM protection on the example of printer cartridges\",\"authors\":\"Wojciech Cybowski\",\"doi\":\"10.31648/ts.7634\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The subject of this paper is to analyze the way of implementation and operation of hardware DRM protection systems on the example of selected printer cartridges. Thanks to the analysis, it is possible to understand the way of operation of typical security chips used in printer cartridges. Using the knowledge gained, it becomes possible to modify the data on the security chips and thus reset the protection, so that the printer sees the chip with the modified data as a new one. However, the process itself was difficult due to the lack of publicly available materials on this topic. In this paper, different approaches to DRM security analysis have been used, so that the reader can try to perform the described steps to analyze other hardware DRM systems by himself. In addition, devices called resetters have been designed and fabricated to quickly reset the analyzed security chips. Their design and documentation is available on the author's Github.\",\"PeriodicalId\":41669,\"journal\":{\"name\":\"Archives for Technical Sciences\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.2000,\"publicationDate\":\"2022-09-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Archives for Technical Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31648/ts.7634\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, GEOLOGICAL\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Archives for Technical Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31648/ts.7634","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, GEOLOGICAL","Score":null,"Total":0}
引用次数: 0

摘要

本文以选定的打印机墨盒为例,分析硬件DRM保护系统的实现方式和运行方式。通过分析,可以了解打印机墨盒中使用的典型安全芯片的操作方式。利用所获得的知识,可以修改安全芯片上的数据,从而重置保护,使打印机将修改数据的芯片视为新的芯片。然而,由于缺乏关于这一主题的公开材料,这一过程本身就很困难。本文使用了不同的DRM安全性分析方法,以便读者可以尝试自己执行所描述的步骤来分析其他硬件DRM系统。此外,已经设计和制造了称为复位器的设备,以快速复位分析的安全芯片。他们的设计和文档可以在作者的Github上找到。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Methods of implementation and operation of hardware DRM protection on the example of printer cartridges
The subject of this paper is to analyze the way of implementation and operation of hardware DRM protection systems on the example of selected printer cartridges. Thanks to the analysis, it is possible to understand the way of operation of typical security chips used in printer cartridges. Using the knowledge gained, it becomes possible to modify the data on the security chips and thus reset the protection, so that the printer sees the chip with the modified data as a new one. However, the process itself was difficult due to the lack of publicly available materials on this topic. In this paper, different approaches to DRM security analysis have been used, so that the reader can try to perform the described steps to analyze other hardware DRM systems by himself. In addition, devices called resetters have been designed and fabricated to quickly reset the analyzed security chips. Their design and documentation is available on the author's Github.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Archives for Technical Sciences
Archives for Technical Sciences ENGINEERING, GEOLOGICAL-
自引率
0.00%
发文量
10
期刊最新文献
EFFECTS OF LANDFILL LEACHES ON GROUND AND SURFACE WATERS: A CASE STUDY OF A WILD LANDFILL IN EASTERN BOSNIA AND HERZEGOVINA ARCHITECTURAL DESIGNING THE NURSING HOMES IN TEHRAN CITY (AS A SAMPLE) ANALYSIS OF OCCUPATIONAL INJURIES IN AN IRON ORE MINE IN BOSNIA AND HERZEGOVINA IN THE PERIOD FROM 2002 TO 2021 LIQUEFACTION-INDUCED DAMAGE IN THE CITIES OF ISKENDERUN AND GOLBASI AFTER THE 2023 TURKEY EARTHQUAKE IDENTIFICATION AND ANALYSIS OF RISKS IN CIVIL ENGINEERING PROJECTS
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1