Abstract
In most existing digital rights management (DRM) technologies, the DRM agent, or DRM client, contains the content protection mechanisms applied to the system. However, the DRM agent that runs at the consumer side is often exposed to reverse engineering to compromise DRM agent or to obtain the secret license information kept at the DRM agent. In this paper, we propose an algorithm to protect against the reverse engineering of DRM agent codes and thus to protect the inside workings of the DRM agents. Our algorithm is based on self-modifying code and control flow flatten techniques. And after applying our algorithm, the agent software becomes hard to be analyzed by the attacker, which can be seen from the experimental results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sachan, A., Emmanuel, S., Das, A., Kankanhalli, M.S.: Privacy preserving multiparty multilevel drm architecture. In: Workshop on Digital Rights Management, 6th IEEE Consumer Communications and Networking Conference, pp. 1–5 (2009)
Thomas, T., Emmanuel, S., Das, A., Kankanhalli, M.: Secure multimedia content delivery with multiparty multilevel DRM architecture. In: Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video, pp. 85–90. ACM, New York (2009)
Michiels, S., Verslype, K., Joosen, W., De Decker, B.: Towards a software architecture for DRM. In: Proceedings of the 5th ACM workshop on Digital rights management, pp. 65–74. ACM, New York (2005)
Wang, C., Hill, J., Knight, J., Davidson, J.: Software tamper resistance: Obstructing static analysis of programs. University of Virginia, Charlottesville, VA (2000)
Ge, J., Chaudhuri, S., Tyagi, A.: Control flow based obfuscation. In: Proceedings of the 5th ACM workshop on Digital rights management, pp. 83–92. ACM, New York (2005)
Popov, I., Debray, S., Andrews, G.: Binary obfuscation using signals. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium table of contents. USENIX Association, Berkeley (2007)
Madou, M., Anckaert, B., Moseley, P., Debray, S., De Sutter, B., De Bosschere, K.: Software Protection Through Dynamic Code Mutation. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 194–206. Springer, Heidelberg (2006)
Kanzaki, Y., Monden, A., Nakamura, M., Matsumoto, K.: Exploiting self-modification mechanism for program protection. In: Proceedings of 27th Annual International Computer Software and Applications Conference, 2003. COMPSAC 2003, pp. 170–179 (2003)
Anckaert, B., Madou, M., De Bosschere, K.: A Model for Self-Modifying Code. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 232–248. Springer, Heidelberg (2007)
Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 184–196. ACM, New York (1998)
Majumdar, A., Thomborson, C.: Manufacturing opaque predicates in distributed systems for code obfuscation. In: Proceedings of the 29th Australasian Computer Science Conference, vol. 48, pp. 187–196. Australian Computer Society, Inc., Darlinghurst (2006)
Wang, C., Davidson, J., Hill, J., Knight, J.: Protection of Software-based Survivability Mechanisms. In: Proc. International Conference of Dependable Systems and Networks (July 2001)
Wang, C.: A Security Architecture for survivability Mechanisms. Phd thesis, Department of Computer Science, University of Virginia (October 2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liang, S., Emmanuel, S. (2009). Protection of DRM Agent Codes. In: Muneesawang, P., Wu, F., Kumazawa, I., Roeksabutr, A., Liao, M., Tang, X. (eds) Advances in Multimedia Information Processing - PCM 2009. PCM 2009. Lecture Notes in Computer Science, vol 5879. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10467-1_65
Download citation
DOI: https://doi.org/10.1007/978-3-642-10467-1_65
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10466-4
Online ISBN: 978-3-642-10467-1
eBook Packages: Computer ScienceComputer Science (R0)