메뉴 건너뛰기




Volumn , Issue , 2013, Pages 687-702

Steal this movie - Automatically bypassing DRM protection in streaming media services

Author keywords

[No Author keywords available]

Indexed keywords

MEDIA STREAMING; MOTION PICTURES; VIDEO ON DEMAND;

EID: 84967246245     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (45)

References (50)
  • 1
    • 85080731454 scopus 로고
    • RC4, 1994. http://web.archive.org/web/20080404222417/http://cypherpunks.venona.com/date/1994/09/msg00304.html.
    • (1994) RC4
  • 2
    • 85080667639 scopus 로고    scopus 로고
    • RTMP, 2009. http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/devnet/rtmp/pdf/rtmp_specification_1.0.pdf.
    • (2009) RTMP
  • 3
    • 85080742583 scopus 로고    scopus 로고
    • Adobe RTMPE, 2012. http://lkcl.net/rtmp/RTMPE.txt.
    • (2012) Adobe RTMPE
  • 4
    • 85080751724 scopus 로고    scopus 로고
    • Audials software, 2012. http://audials.com/en/how_to_record_stream_capture_music_videos_movies_from/netflix.html.
    • (2012) Audials Software
  • 5
    • 85080707810 scopus 로고    scopus 로고
    • The despotify project, 2012. http://despotify.se/.
    • (2012)
  • 7
    • 85080678916 scopus 로고    scopus 로고
    • Esperanza project, 2012. http://code.google.com/p/esperanza.
    • (2012) Esperanza Project
  • 10
    • 85080642860 scopus 로고    scopus 로고
    • Microsoft PlayReady DRM, 2012. http://msdn.microsoft.com/en-us/library/cc838192(VS.95).aspx.
    • (2012) Microsoft PlayReady DRM
  • 11
    • 85080670439 scopus 로고    scopus 로고
    • Microsoft protected media path, 2012. http://scholar.google.com/scholar?hl=en&q=protected+media+path&btnG=&as_sdt=1%2C5&as_sdtp=.
    • (2012) Microsoft Protected Media Path
  • 12
    • 85080800696 scopus 로고    scopus 로고
    • Nation of unrepentant pirates costs $900m, 2012. http://www.smh.com.au/technology/technology-news/nation-of\%2Dunrepentant-pirates-costs\%2D900m-20110305\%2D1bix5.html.
    • (2012) Nation of Unrepentant Pirates Costs $900m
  • 14
  • 15
    • 85080662776 scopus 로고    scopus 로고
    • Spotify DRM, 2012. http://www.defectivebydesign.org/spotify.
    • (2012) Spotify DRM
  • 16
    • 85063636742 scopus 로고    scopus 로고
    • QEMU, a fast and portable dynamic translator
    • F. Bellard. QEMU, a fast and portable dynamic translator. USENIX, 2005.
    • (2005) USENIX
    • Bellard, F.1
  • 17
    • 21644459205 scopus 로고    scopus 로고
    • Watermarking to track motion picture theft
    • Conference Record of the Thirty-Eighth Asilomar Conference on IEEE
    • J. Bloom and C. Polyzois. Watermarking to track motion picture theft. In Signals, Systems and Computers, 2004. Conference Record of the Thirty-Eighth Asilomar Conference on, Volume 1, pages 363-367. IEEE, 2004.
    • (2004) Signals, Systems and Computers, 2004 , vol.1 , pp. 363-367
    • Bloom, J.1    Polyzois, C.2
  • 18
    • 0029694397 scopus 로고    scopus 로고
    • Digital watermarks for audio signals
    • Proceedings of the Third IEEE International Conference on IEEE
    • L. Boney, A. Tewfik, and K. Hamdy. Digital watermarks for audio signals. In Multimedia Computing and Systems, 1996., Proceedings of the Third IEEE International Conference on, pages 473-480. IEEE, 1996.
    • (1996) Multimedia Computing and Systems, 1996 , pp. 473-480
    • Boney, L.1    Tewfik, A.2    Hamdy, K.3
  • 28
    • 0042634381 scopus 로고    scopus 로고
    • © watermark: Closing the analog hole
    • ICCE. 2003 IEEE International Conference on IEEE
    • E. Diehl and T. Furon. © watermark: Closing the analog hole. In Consumer Electronics, 2003. ICCE. 2003 IEEE International Conference on, pages 52-53. IEEE, 2003.
    • (2003) Consumer Electronics, 2003 , pp. 52-53
    • Diehl, E.1    Furon, T.2
  • 32
    • 84857262964 scopus 로고    scopus 로고
    • Automated identification of cryptographic primitives in binary programs
    • Springer
    • F. Gröbert, C. Willems, and T. Holz. Automated identification of cryptographic primitives in binary programs. In Recent Advances in Intrusion Detection, pages 41-60. Springer, 2011.
    • (2011) Recent Advances in Intrusion Detection , pp. 41-60
    • Gröbert, F.1    Willems, C.2    Holz, T.3
  • 42
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon. Communication theory of secrecy systems. Bell system technical journal, 28(4):656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.1
  • 43
    • 84951736831 scopus 로고    scopus 로고
    • Howard: A dynamic excavator for reverse engineering data structures
    • A. Slowinska, T. Stancescu, and H. Bos. Howard: a dynamic excavator for reverse engineering data structures. In Proceedings of NDSS, 2011.
    • (2011) Proceedings of NDSS
    • Slowinska, A.1    Stancescu, T.2    Bos, H.3
  • 45
    • 0033353026 scopus 로고    scopus 로고
    • Internet streaming SIMD extensions
    • S. Thakkur and T. Huff. Internet streaming SIMD extensions. Computer, 32(12):26-34, 1999.
    • (1999) Computer , vol.32 , Issue.12 , pp. 26-34
    • Thakkur, S.1    Huff, T.2
  • 50
    • 77957584064 scopus 로고    scopus 로고
    • Privacy scope: A precise information flow tracking system for finding application leaks
    • Department of Computer Science, UC Berkeley
    • Y. Zhu, J. Jung, D. Song, T. Kohno, and D. Wetherall. Privacy scope: A precise information flow tracking system for finding application leaks. Technical report, Tech. Rep. EECS-2009-145, Department of Computer Science, UC Berkeley, 2009.
    • (2009) Technical Report, Tech. Rep. EECS-2009-145
    • Zhu, Y.1    Jung, J.2    Song, D.3    Kohno, T.4    Wetherall, D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.