Presentation is loading. Please wait.

Presentation is loading. Please wait.

H.L. Jonker Security aspects of Digital Rights Management Systems H.L. Jonker, TNO ITSEF Co-authors: S. Mauw (TU/e), J.H.S. Verschuren and A.T.S.C. Schoonen.

Similar presentations


Presentation on theme: "H.L. Jonker Security aspects of Digital Rights Management Systems H.L. Jonker, TNO ITSEF Co-authors: S. Mauw (TU/e), J.H.S. Verschuren and A.T.S.C. Schoonen."— Presentation transcript:

1 H.L. Jonker Security aspects of Digital Rights Management Systems H.L. Jonker, TNO ITSEF Co-authors: S. Mauw (TU/e), J.H.S. Verschuren and A.T.S.C. Schoonen (TNO ITSEF)

2 H.L. Jonker2/15 Contents Introduction What is Digital Rights Management? How does DRM work? Supporting techniques Een voorbeeld model Security van DRM

3 H.L. Jonker3/15 Introduction Distributing digital: Low overhead costs No middle man People are (getting) used to buying online and to acquiring “content” digitally  there is a market Risc: Content is further distributed, as bits and bytes are easily copied Solution: Digital Rights Management

4 H.L. Jonker4/15 What is Digital Rights Management? Access control > copy control DRM is access control

5 H.L. Jonker5/15 What is DRM? (2) Distribution of digitized, encrypted “content” Video (films, clips) Audio (music, audio books) Text (boeken, kranten) Pictures (photo’s, logo’s, comics) (?) Software Content is only accessible with a license License specifies accessrights License is bound to a single user/device Any other access is “impossible” Application domains: internet, cable-tv, cellphone, consumer electronics

6 H.L. Jonker6/15 How does DRM work? Current status: many initiatives, few practical solutions Client-server architecture Per network/device different solutions: Internet, cellphone, cable TV, consumer electronics, … Capabilities of the device limit the possibilities of a DRM solution on such a device “Weakest” device determines limits on the solutions for a network type Many variations: Supporting techniques (TCB, watermarking, fingerprinting, DOI,…) Simple systems to complex systems

7 H.L. Jonker7/15 Generic breakdown of DRM systems Rights Expression Language (REL) / Rights Data Dictionary (RDD) Content identification: DOI, fingerprinting, watermarking Hardware / Software Trusted Computing Base (TCB) Cryptography Tracing content: watermarking Ability to update (support for) Interoperability Standardised metadata (e.g. )

8 H.L. Jonker8/15 Breakdown – Hardware / Software TCB Trust by third parties in calculations Calculation cannot be inspected or altered Access to data can be limited to the TCB Example: SmartCard Software TCB key hiding code tamper resistance data tamper resistance

9 H.L. Jonker9/15 Breakdown – Cryptography Secure container Only accessible with valid license Secure communication Authentication Anonimity (?)

10 H.L. Jonker10/15 Influence of networks on DRM Internet Client-side security Medium hardware update speed Open platform (to users) User resistance against hardware crypto devices Rendering High quality capabilities Cell phones Client-side security new hardware can be introduced quickly Closed platform (to users), equipped with TCB (SIM-card) Rendering Limited audio/video capabilities Limited storage capabilities

11 H.L. Jonker11/15 Security aspects of DRM systems Protecting the content Access to the secure container can only occur using a valid license License is encrypted for the TCB Protecting the privacy of users Only directly required personal information may be asked, and only kept as long as is required to complete a transaction Correct functionality ensured for all parties Content seller cannot falsely deny that a user bought content User cannot falsely proof (or deny) to have bought content

12 H.L. Jonker12/15 Example model Server sideUser side content provider packager license server secure container network interface storage player video driver audio driver video card analogue output device sound card analogue output device user interface network user browser trusted computing base

13 H.L. Jonker13/15 Security aspects of DRM systems (2) Protecting content: Threat model: powerful attacker Security goal: no access without a valid license Each box and arrow can be intercepted or replaced: Communication interception Key retrieval Server hacking Security errors in communicationprotocol Hacking programs On top of that: the analogue output can be recorded

14 H.L. Jonker14/15 Evaluation criteria Security goal achieved with threat model Single points of failure Dependencies Updatability Interoperability

15 H.L. Jonker15/15 Future work Security analysis of existing models / systems Using analysis to improve model Comparing the security of DRM systems Questions?

16 H.L. Jonker16/15 Wettelijke aspecten van DRM Copyright (auteurswet) Recht op kopiëen voor eigen gebruik Doorverkoop Beperkte looptijd: balans tussen innovatie impuls en verspreiding van informatie Privacy (wet registratie persoonsgegevens) Alleen met instemming; doel moet vermeld worden Gegevens moeten nodig zijn voor dat doel Niet langer bewaren dan noodzakelijk


Download ppt "H.L. Jonker Security aspects of Digital Rights Management Systems H.L. Jonker, TNO ITSEF Co-authors: S. Mauw (TU/e), J.H.S. Verschuren and A.T.S.C. Schoonen."

Similar presentations


Ads by Google