DRM Under Attack: Weaknesses in Existing Systems [chapter]

Tobias Hauser, Christian Wenz
2003 Lecture Notes in Computer Science  
DRM systems are insecure. This statement seems to be too simple. But like all simplifications it has a true background: Every piece of software is breakable. This chapter shows what possibilities an unfriendly intruder has and which leaks DRM systems must close in consequence. We cover audio and video protection mechanisms as well as eBooks. II DRM Systems in Player Software The attacks of crackers on DRM-protected content can generally be divided into two areas: Attacks directly targeted at
more » ... key of the DRM system and circumvention methods like sound and video grabbing which attack directly in 517 Hauser Wenz Partnerschaftsgesellschaft. 518 Someone who breaks systems is called a cracker. Hackers are persons who have an insight-view into systems but do not destroy anything. A discussion about these two terms can be found at:
doi:10.1007/10941270_14 fatcat:7vq4zbebm5gx3hdebmt3qw3vau