A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
DRM Under Attack: Weaknesses in Existing Systems
[chapter]
2003
Lecture Notes in Computer Science
DRM systems are insecure. This statement seems to be too simple. But like all simplifications it has a true background: Every piece of software is breakable. This chapter shows what possibilities an unfriendly intruder has and which leaks DRM systems must close in consequence. We cover audio and video protection mechanisms as well as eBooks. II DRM Systems in Player Software The attacks of crackers on DRM-protected content can generally be divided into two areas: Attacks directly targeted at
doi:10.1007/10941270_14
fatcat:7vq4zbebm5gx3hdebmt3qw3vau