메뉴 건너뛰기




Volumn 56, Issue , 2016, Pages 94-110

An adversary model to evaluate DRM protection of video contents on iOS devices

Author keywords

Adversary model; Encryption; HLS; HTTP live streaming; iOS DRM; Live TV; Video stream protection; Video on Demand

Indexed keywords

CRYPTOGRAPHY; DIGITAL DEVICES; IOS (OPERATING SYSTEM); MOBILE DEVICES; MOBILE TELECOMMUNICATION SYSTEMS; VIDEO ON DEMAND; VIDEO STREAMING;

EID: 84949096402     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2015.06.009     Document Type: Article
Times cited : (37)

References (46)
  • 1
    • 84907899235 scopus 로고    scopus 로고
    • accessed 30.03.15
    • Accenture Video-over-internet consumer survey http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture-Video-Over-Internet-Consumer-Survey-2013.pdf 2013 accessed 30.03.15
    • (2013) Video-over-internet Consumer Survey
    • Accenture1
  • 2
    • 84949087827 scopus 로고    scopus 로고
    • accessed 30.03.15
    • Apple iTunes Preview 3NOW - on demand https://itunes.apple.com/au/app/3now-on-demand-for-your-iphone/id713771599?mt=8 2015 accessed 30.03.15
    • (2015) Apple Itunes Preview. 3NOW - On Demand
  • 3
    • 84949090653 scopus 로고    scopus 로고
    • accessed 30.03.15
    • Apple Inc. HTTP live streaming overview https://developer.apple.com/library/ios/documentation/NetworkingInternet/Conceptual/StreamingMediaGuide/StreamingMediaGuide.pdf 2014 accessed 30.03.15
    • (2014) HTTP Live Streaming Overview
    • Apple Inc.1
  • 6
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Springer-Verlag
    • M. Bellare, and P. Rogaway Entity authentication and key distribution Proceedings of the Advances in Cryptology, vol. 773, pp. 232-249, Springer-Verlag 1993
    • (1993) Proceedings of the Advances in Cryptology , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 84904857300 scopus 로고    scopus 로고
    • Exploiting P2P scalability for grant authorization in digital rights management solutions
    • P. Bellini, P. Nesi, and F. Pazzaglia Exploiting P2P scalability for grant authorization in digital rights management solutions Mult Tool Appl 72 2 2014 1611 1637
    • (2014) Mult Tool Appl , vol.72 , Issue.2 , pp. 1611-1637
    • Bellini, P.1    Nesi, P.2    Pazzaglia, F.3
  • 10
    • 33845638668 scopus 로고    scopus 로고
    • Refuting security proofs for tripartite key exchange with model checker in planning problem setting
    • K.-K.R. Choo Refuting security proofs for tripartite key exchange with model checker in planning problem setting Proceedings of the IEEE Computer Security Foundations Workshop (CSFW), pp. 297-308 2006
    • (2006) Proceedings of the IEEE Computer Security Foundations Workshop (CSFW) , pp. 297-308
    • Choo, K.-K.R.1
  • 11
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: Challenges and future research directions
    • K.-K.R. Choo The cyber threat landscape: challenges and future research directions Comput Secur 30 8 2011 719 731
    • (2011) Comput Secur , vol.30 , Issue.8 , pp. 719-731
    • Choo, K.-K.R.1
  • 14
    • 84929234268 scopus 로고    scopus 로고
    • An anonymous and secure biometric-based enterprise digital rights management system for mobile environment
    • In press
    • A.K. Das, D. Mishra, and S. Mukhopadhyay An anonymous and secure biometric-based enterprise digital rights management system for mobile environment Secur Commun Netw 2015 10.1002/sec.1266 In press
    • (2015) Secur Commun Netw
    • Das, A.K.1    Mishra, D.2    Mukhopadhyay, S.3
  • 15
    • 84912008171 scopus 로고    scopus 로고
    • Exfiltrating data from Android devices
    • Q. Do, B. Martini, and K.-K.R. Choo Exfiltrating data from Android devices Comput Secur 48 2015 74 91
    • (2015) Comput Secur , vol.48 , pp. 74-91
    • Do, Q.1    Martini, B.2    Choo, K.-K.R.3
  • 16
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev, and Yao A.C. On the security of public key protocols IEEE Trans Inf Technol 29 2 1983 198 208
    • (1983) IEEE Trans Inf Technol , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 23
    • 84897488123 scopus 로고    scopus 로고
    • A method for trusted usage control over digital contents based on cloud computing
    • Huang T., Zhang Z., Chen Q., and Chang Y. A method for trusted usage control over digital contents based on cloud computing Int J Digit Content Technol Appl 7 4 2013 795 802
    • (2013) Int J Digit Content Technol Appl , vol.7 , Issue.4 , pp. 795-802
    • Huang, T.1    Zhang, Z.2    Chen, Q.3    Chang, Y.4
  • 24
    • 33845409136 scopus 로고    scopus 로고
    • Towards Meeting the Privacy Challenge: Adapting DRM
    • Washington, DC, USA
    • L. Korba, and S. Kenny Towards Meeting the Privacy Challenge: adapting DRM Digital Rights Management: ACM CCS-9 Workshop, Washington, DC, USA, pp. 118-136 2002
    • (2002) Digital Rights Management: ACM CCS-9 Workshop , pp. 118-136
    • Korba, L.1    Kenny, S.2
  • 25
    • 84949101193 scopus 로고    scopus 로고
    • An efficient Fibonacci based content distribution scheme for interactive VoD streaming
    • G. Kowsalya, T. Sudha, D. Jeeva, and M. Parthiban An efficient Fibonacci based content distribution scheme for interactive VoD streaming i-Manager's J Info Tech 2 2 2013 32 39
    • (2013) I-Manager's J Info Tech , vol.2 , Issue.2 , pp. 32-39
    • Kowsalya, G.1    Sudha, T.2    Jeeva, D.3    Parthiban, M.4
  • 27
    • 84890026492 scopus 로고    scopus 로고
    • accessed 30.03.15
    • A. Langley Maintaining digital certificate security http://googleonlinesecurity.blogspot.com.au/2015/03/maintaining-digital-certificate-security.html 2015 accessed 30.03.15
    • (2015) Maintaining Digital Certificate Security
    • Langley, A.1
  • 28
    • 7444222166 scopus 로고    scopus 로고
    • Digital rights management for content distribution
    • Liu Q., R. Safavi-Naini, and N. Sheppard Digital rights management for content distribution Proc AISW 21 2003 49 58
    • (2003) Proc AISW , vol.21 , pp. 49-58
    • Liu, Q.1    Safavi-Naini, R.2    Sheppard, N.3
  • 29
    • 84893377818 scopus 로고    scopus 로고
    • Investigating redundant internet video streaming traffic on iOS devices, causes and solutions
    • Liu Y., Wei Q., Guo L., Shen B., Chen S., and Y. Lan Investigating redundant internet video streaming traffic on iOS devices, causes and solutions IEEE Trans Mult 16 2 2014 510 520
    • (2014) IEEE Trans Mult , vol.16 , Issue.2 , pp. 510-520
    • Liu, Y.1    Wei, Q.2    Guo, L.3    Shen, B.4    Chen, S.5    Lan, Y.6
  • 33
    • 84949109143 scopus 로고    scopus 로고
    • accessed 19.05.15
    • Research2Guidance Mobile health market http://www.research2guidance.com/shop/index.php/downloadable/download/sample/sample-id/262/ 2013 accessed 19.05.15
    • (2013) Mobile Health Market
    • Research2guidance1
  • 36
    • 84927669373 scopus 로고    scopus 로고
    • Testing-as-a-service for mobile applications: State-of-the-art survey
    • O. Starov, S. Vilkomir, A. Gorbenko, and V. Kharchenko Testing-as-a-service for mobile applications: state-of-the-art survey Adv Intel Sys Comput 307 2015 55 71
    • (2015) Adv Intel Sys Comput , vol.307 , pp. 55-71
    • Starov, O.1    Vilkomir, S.2    Gorbenko, A.3    Kharchenko, V.4
  • 40
    • 84863748235 scopus 로고    scopus 로고
    • Strengthening digital rights management using a new driver-hidden rootkit
    • W.-J. Tsaur Strengthening digital rights management using a new driver-hidden rootkit IEEE Trans Consum Electron 58 2 2012 479 483
    • (2012) IEEE Trans Consum Electron , vol.58 , Issue.2 , pp. 479-483
    • Tsaur, W.-J.1
  • 42
    • 84898003401 scopus 로고    scopus 로고
    • Identifying back doors, attack points, and surveillance mechanisms in iOS devices
    • J. Zdziarski Identifying back doors, attack points, and surveillance mechanisms in iOS devices Digit Investig 11 1 2014 3 19
    • (2014) Digit Investig , vol.11 , Issue.1 , pp. 3-19
    • Zdziarski, J.1
  • 45
    • 77956977210 scopus 로고    scopus 로고
    • Security and trust in digital rights management, a survey
    • Zhang Z., Pei Q., Ma J., and Yang L. Security and trust in digital rights management, a survey Int J Netw Secur 9 3 2009 247 263
    • (2009) Int J Netw Secur , vol.9 , Issue.3 , pp. 247-263
    • Zhang, Z.1    Pei, Q.2    Ma, J.3    Yang, L.4
  • 46
    • 84939264725 scopus 로고    scopus 로고
    • A novel approach to rights sharing-enabling digital rights management for mobile multimedia
    • Zhang Z., Wang Z., and Niu D. A novel approach to rights sharing-enabling digital rights management for mobile multimedia J Mult Tool Appl 2014 10.1007/s11042-014-2135-7
    • (2014) J Mult Tool Appl
    • Zhang, Z.1    Wang, Z.2    Niu, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.