Exploring Widevine for Fun and Profit

04/20/2022
by   Gwendal Patat, et al.
0

For years, Digital Right Management (DRM) systems have been used as the go-to solution for media content protection against piracy. With the growing consumption of content using Over-the-Top platforms, such as Netflix or Prime Video, DRMs have been deployed on numerous devices considered as potential hostile environments. In this paper, we focus on the most widespread solution, the closed-source Widevine DRM. Installed on billions of devices, Widevine relies on cryptographic operations to protect content. Our work presents a study of Widevine internals on Android, mapping its distinct components and bringing out its different cryptographic keys involved in content decryption. We provide a structural view of Widevine as a protocol with its complete key ladder. Based on our insights, we develop WideXtractor, a tool based on Frida to trace Widevine function calls and intercept messages for inspection. Using this tool, we analyze Netflix usage of Widevine as a proof-of-concept, and raised privacy concerns on user-tracking. In addition, we leverage our knowledge to bypass the obfuscation of Android Widevine software-only version, namely L3, and recover its Root-of-Trust.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/23/2018

Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials

Personal cryptographic keys are the foundation of many secure services, ...
research
05/18/2021

Enabling self-verifiable mutable content items in IPFS using Decentralized Identifiers

In IPFS content identifiers are constructed based on the item's data the...
research
08/10/2023

Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME

Thanks to HTML5, users can now view videos on Web browsers without insta...
research
12/03/2020

On Root Detection Strategies for Android Devices

The Android operating system runs on the majority of smartphones nowaday...
research
02/23/2022

AirGuard – Protecting Android Users From Stalking Attacks By Apple Find My Devices

Finder networks in general, and Apple's Find My network in particular, c...
research
04/06/2021

ASTANA: Practical String Deobfuscation for Android Applications Using Program Slicing

Software obfuscation is widely used by Android developers to protect the...
research
10/11/2021

Privacy preserving local analysis of digital trace data: A proof-of-concept

We present PORT, a software platform for local data extraction and analy...

Please sign up or login with your details

Forgot password? Click here to reset