Digital Rights Management: The Technology Behidn The Hype

A specific digital rights management (DRM) system designed for digital document protection is presented in some detail. Following some background information on document protection, the various technical measures employed by this DRM system are discussed. These technical measures include a variety of tamper-resistance methods, controlled execution techniques, encryption, digital watermarking and other techniques. The discussion of specific security features is followed by a discussion of several other current and developing DRM systems and technologies. Comments and conjectures on the limitations and future directions of the technology are made throughout.

[1]  Frederick B. Cohen,et al.  Operating system protection through program evolution , 1993, Comput. Secur..

[2]  David Aucsmith,et al.  Tamper Resistant Software: An Implementation , 1996, Information Hiding.

[3]  Christian S. Collberg,et al.  A Taxonomy of Obfuscating Transformations , 1997 .

[4]  David H. Ackley,et al.  Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).

[5]  Andrew Odlyzko,et al.  The Rise and Fall of Knapsack Cryptosystems , 1998 .

[6]  Adi Shamir,et al.  Playing "Hide and Seek" with Stored Keys , 1999, Financial Cryptography.

[7]  Min Wu,et al.  Reading Between the Lines: Lessons from the SDMI Challenge , 2001, USENIX Security Symposium.

[8]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[9]  Amit Sahai,et al.  On the (im)possibility of obfuscating programs : (Extended abstract) , 2001, CRYPTO 2001.

[10]  Mikhail J. Atallah,et al.  Protecting Software Code by Guards , 2001, Digital Rights Management Workshop.

[11]  Stephen Mooney,et al.  Digital Rights Management: Business and Technology , 2001 .

[12]  Robert E. Tarjan,et al.  Dynamic Self-Checking Techniques for Improved Tamper Resistance , 2001, Digital Rights Management Workshop.

[13]  Tomas Sander Security and Privacy in Digital Rights Management : ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001 : revised papers , 2002, CCS 2002.

[14]  J. Casti The One True Platonic Heaven: A Scientific Fiction on the Limits of Knowledge , 2003 .