Analysis of security vulnerabilities in the movie production and distribution process

Simon Byers, Lorrie Cranor, Dave Korman, Patrick McDaniel, Eric Cronin
<span title="">2003</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xwfzgnzll5fwnl5h2m226tjuoa" style="color: black;">Proceedings of the 2003 ACM workshop on Digital rights management - DRM &#39;03</a> </i> &nbsp;
Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some time, low-cost, high-bandwidth Internet connections and peer-topeer file sharing networks provide highly efficient distribution media. Many movies are showing up on file sharing networks shortly after, and in some cases prior to, theatrical release. It has been argued that the availability of unauthorized copies
more &raquo; ... affects theater attendance and DVD sales, and hence represents a major financial threat to the movie industry. Our research attempts to determine the source of unauthorized copies by studying the availability and characteristics of recent popular movies in file sharing networks. We developed a data set of 312 popular movies and located one or more samples of 183 of these movies on file sharing networks, for a total of 285 movie samples. 77% of these samples appear to have been leaked by industry insiders. Most of our samples appeared on file sharing networks prior to their official consumer DVD release date. Indeed, of the movies that had been released on DVD as of the time of our study, only 5% first appeared after their DVD release date on a web site that indexes file sharing networks, indicating that consumer DVD copying currently represents a relatively minor factor compared with insider leaks. We perform a brief analysis of the movie production and distribution process and identify potential security vulnerabilities that may lead to unauthorized copies becom-ing available to those who may wish to redistribute them. Finally, we offer recommendations for reducing security vulnerabilities in the movie production and distribution process.
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/947380.947383">doi:10.1145/947380.947383</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/drm/ByersCKMC03.html">dblp:conf/drm/ByersCKMC03</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/urq3doyc6fblhncg4nyzt6xfle">fatcat:urq3doyc6fblhncg4nyzt6xfle</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20040601234710/http://pdf.textfiles.com:80/academics/moviesecvulnerable3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f1/d6/f1d6337888c7af24ffce49b2ea19d968244336de.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/947380.947383"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>