A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery

08/01/2023
by   Amir Rafi, et al.
0

Digital rights management (DRM) solutions aim to prevent the copying or distribution of copyrighted material. On mobile devices, a variety of DRM technologies have become widely deployed. However, a detailed security study comparing their internal workings, and their strengths and weaknesses, remains missing in the existing literature. In this paper, we present the first detailed security analysis of mobile DRM systems, addressing the modern paradigm of cloud-based content delivery followed by major platforms, such as Netflix, Disney+, and Amazon Prime. We extensively analyse the security of three widely used DRM solutions – Google Widevine, Apple FairPlay, and Microsoft PlayReady – deployed on billions of devices worldwide. We then consolidate their features and capabilities, deriving common features and security properties for their evaluation. Furthermore, we identify some design-level shortcomings that render them vulnerable to emerging attacks within the state of the art, including micro-architectural side-channel vulnerabilities and an absence of post-quantum security. Lastly, we propose mitigations and suggest future directions of research.

READ FULL TEXT

page 3

page 5

research
05/26/2021

Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions

In this work we present definitive evidence, analysis, and (where needed...
research
02/23/2022

IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems

Recent research in micro-architectural attacks has uncovered a variety o...
research
07/16/2014

Security of OS-level virtualization technologies: Technical report

The need for flexible, low-overhead virtualization is evident on many fr...
research
07/17/2022

Mobile Security for the modern CEO: Attacks, Mitigations, and Future Trends

Todays world is digital, global, and interconnected and mobile devices a...
research
02/23/2022

BYOD Security: A Study of Human Dimensions

The prevalence and maturity of Bring Your Own Device (BYOD) security alo...
research
10/02/2022

Automated Security Analysis of Exposure Notification Systems

We present the first formal analysis and comparison of the security of t...
research
07/08/2021

Serverless Computing: A Security Perspective

Serverless Computing is a virtualisation-related paradigm that promises ...

Please sign up or login with your details

Forgot password? Click here to reset