shortcomings of Android DRM and EME on open platforms

This commit is contained in:
Trolli Schmittlauch 2018-09-19 17:04:01 +02:00
parent 894181bc22
commit 9573c8ce69
2 changed files with 74 additions and 31 deletions

View file

@ -5,6 +5,8 @@
doi = {10.1109/ICDCS.2017.29},
abstract = {The growing computerization of critical infrastructure as well as the pervasiveness of computing in everyday life has led to increased interest in secure application development. We observe a flurry of new security technologies like ARM TrustZone and Intel SGX, but a lack of a corresponding architectural vision. We are convinced that point solutions are not sufficient to address the overall challenge of secure system design. In this paper, we outline our take on a trusted component ecosystem of small individual building blocks with strong isolation. In our view, applications should no longer be designed as massive stacks of vertically layered frameworks, but instead as horizontal aggregates of mutually isolated components that collaborate across machine boundaries to provide a service. Lateral thinking is needed to make secure systems going forward.},
language = {en},
urldate = {2018-08-01},
url = {http://ieeexplore.ieee.org/document/7980129/},
publisher = {{IEEE}},
author = {Hartig, Hermann and Roitzsch, Michael and Weinhold, Carsten and Lackorzynski, Adam},
month = jun,
@ -18,6 +20,7 @@
address = {Austin, TX},
title = {{{fTPM}}: {{A Software}}-{{Only Implementation}} of a {{TPM Chip}}},
isbn = {978-1-931971-32-4},
url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/raj},
booktitle = {25th {{USENIX Security Symposium}} ({{USENIX Security}} 16)},
publisher = {{USENIX Association}},
author = {Raj, Himanshu and Saroiu, Stefan and Wolman, Alec and Aigner, Ronald and Cox, Jeremiah and England, Paul and Fenner, Chris and Kinshumann, Kinshuman and Loeser, Jork and Mattoon, Dennis and Nystrom, Magnus and Robinson, David and Spiger, Rob and Thom, Stefan and Wooten, David},
@ -50,7 +53,8 @@
@misc{TrustyTEE,
title = {Trusty {{TEE}}},
language = {en},
howpublished = {https://source.android.com/security/trusty/},
urldate = {2018-08-01},
url = {https://source.android.com/security/trusty/},
journal = {Android Open Source Project},
keywords = {unread,Android},
file = {/home/spiollinux/Zotero/storage/BFQ6MRNT/trusty.html}
@ -59,7 +63,8 @@
@misc{AndroidDRMFramework,
title = {Android {{DRM Framework}}},
language = {en},
howpublished = {https://source.android.com/devices/drm},
urldate = {2018-08-01},
url = {https://source.android.com/devices/drm},
journal = {Android Open Source Project},
keywords = {unread,Android,DRM},
file = {/home/spiollinux/Zotero/storage/B8JG6YAS/drm.html}
@ -67,7 +72,8 @@
@misc{NetflixDefectiveDesign,
title = {Netflix | {{Defective}} by {{Design}} - Www.Defectivebydesign.Org/},
howpublished = {https://www.defectivebydesign.org/netflix},
urldate = {2018-08-01},
url = {https://www.defectivebydesign.org/netflix},
keywords = {unread,DRM},
file = {/home/spiollinux/Zotero/storage/7IHY4HRL/netflix.html}
}
@ -87,7 +93,8 @@
@misc{googleWidevineDRMArchitecture2017,
title = {Widevine {{DRM Architecture Overview}} v1.2},
howpublished = {https://storage.googleapis.com/wvdocs/Widevine\_DRM\_Architecture\_Overview.pdf},
urldate = {2018-08-01},
url = {https://storage.googleapis.com/wvdocs/Widevine_DRM_Architecture_Overview.pdf},
author = {{Google}},
month = mar,
year = {2017},
@ -95,14 +102,17 @@
file = {/home/spiollinux/Zotero/storage/JVFPCN6B/Widevine_DRM_Architecture_Overview.pdf}
}
@misc{NetflixUseGoogle2017,
@misc{andyNetflixUseGoogle2017,
title = {Netflix {{Use}} of {{Google DRM Means Rooted Android Devices Are Banned}}},
abstract = {Netflix customers who previously viewed the service using a 'rooted' Android device are no longer able to do so, at least officially. The development has been confirmed by Netflix, who say that the company's reliance on Google's Widevine DRM standards means that modified and/or non-certified devices will be excluded from the service.},
language = {en},
urldate = {2018-08-01},
url = {https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/},
journal = {TorrentFreak},
author = {{andy}},
month = may,
year = {2017},
keywords = {unread,Android,DRM},
keywords = {Android,DRM},
file = {/home/spiollinux/Zotero/storage/KG8VAWB8/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515.html}
}
@ -123,7 +133,8 @@
title = {Reconciling {{Mozilla}}'s {{Mission}} and {{W3C EME}} \textendash{} {{Mozilla Hacks}} - the {{Web}} Developer Blog},
abstract = {May 19 Update: We've added an FAQ below the text of the original post to address some of the questions and comments Mozilla has received regarding EME. With most competing ...},
language = {en-US},
howpublished = {https://hacks.mozilla.org/2014/05/reconciling-mozillas-mission-and-w3c-eme},
urldate = {2018-08-01},
url = {https://hacks.mozilla.org/2014/05/reconciling-mozillas-mission-and-w3c-eme},
journal = {Mozilla Hacks \textendash{} the Web developer blog},
keywords = {unread,DRM},
file = {/home/spiollinux/Zotero/storage/JVLYK79M/reconciling-mozillas-mission-and-w3c-eme.html}
@ -136,6 +147,8 @@
doi = {10.1109/CSE.2009.15},
abstract = {Digital Rights Management (DRM) is the technological solution to control the distribution and usage of digital assets. However, existing solutions are vulnerable to various attacks in the context where the consumer can control the platform totally. To improve the security of DRM solutions the paper proposes a secure DRM architecture based on TPM which is called TBDRM. It ensures that content is always under the control of the license and such license is secure and fresh during its lifecycle. Compared with other DRM solutions, TBDRM can prevent replay attack and improper access enforced through cracked software.},
language = {en},
urldate = {2018-08-04},
url = {http://ieeexplore.ieee.org/document/5283799/},
publisher = {{IEEE}},
author = {Yu, Aimin and Feng, Dengguo and Liu, Ren},
year = {2009},
@ -152,25 +165,18 @@ This paper analyzes Intel SGX, based on the 3 papers that introduced it, on the
This paper's contributions are a summary of the Intel-specific architectural and micro-architectural details needed to understand SGX, a detailed and structured presentation of the publicly available information on SGX, a series of intelligent guesses about some important but undocumented aspects of SGX, and an analysis of SGX's security properties.},
number = {086},
urldate = {2018-08-05},
url = {https://eprint.iacr.org/2016/086},
author = {Costan, Victor and Devadas, Srinivas},
year = {2016},
keywords = {unread},
file = {/home/spiollinux/Zotero/storage/LBT3GU9H/Costan und Devadas - 2016 - Intel SGX Explained.pdf;/home/spiollinux/Zotero/storage/HD68AJ9F/086.html}
}
@misc{NetflixUseGoogle2017a,
title = {Netflix {{Use}} of {{Google DRM Means Rooted Android Devices Are Banned}}},
abstract = {Netflix customers who previously viewed the service using a 'rooted' Android device are no longer able to do so, at least officially. The development has been confirmed by Netflix, who say that the company's reliance on Google's Widevine DRM standards means that modified and/or non-certified devices will be excluded from the service.},
language = {en},
journal = {TorrentFreak},
month = may,
year = {2017},
file = {/home/spiollinux/Zotero/storage/DWM7DMMX/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515.html}
}
@misc{w3cEncryptedMediaExtensions2017,
title = {Encrypted {{Media Extensions}} - Www.W3.Org/},
howpublished = {https://www.w3.org/TR/encrypted-media/},
urldate = {2018-09-03},
url = {https://www.w3.org/TR/encrypted-media/},
author = {{W3C}},
month = sep,
year = {2017},
@ -179,7 +185,8 @@ This paper's contributions are a summary of the Intel-specific architectural and
@misc{WhatEMEHsivonen,
title = {What Is {{EME}}? - Hsivonen.Fi/},
howpublished = {https://hsivonen.fi/eme/},
urldate = {2018-09-04},
url = {https://hsivonen.fi/eme/},
file = {/home/spiollinux/Zotero/storage/YKJLEHEM/eme.html}
}
@ -189,6 +196,8 @@ This paper's contributions are a summary of the Intel-specific architectural and
issn = {2056-9785, 2056-9793},
language = {English},
number = {9},
urldate = {2018-09-04},
url = {https://www.ceeol.com/search/article-detail?id=496202},
journal = {Journal of Media Critiques},
author = {Daubs, Michael S.},
year = {2017},
@ -214,6 +223,8 @@ This paper's contributions are a summary of the Intel-specific architectural and
type = {Keynote},
title = {The Coming War on General Computation},
language = {English},
urldate = {2018-09-05},
url = {https://media.ccc.de/v/28c3-4848-en-the_coming_war_on_general_computation},
author = {{Cory Doctorow}},
month = dec,
year = {2011},
@ -222,7 +233,8 @@ This paper's contributions are a summary of the Intel-specific architectural and
@misc{bruceschneierCryptoGramMay152001,
title = {Crypto-{{Gram}}: {{May}} 15, 2001 - {{Schneier}} on {{Security}}},
howpublished = {https://www.schneier.com/crypto-gram/archives/2001/0515.html\#3},
urldate = {2018-09-05},
url = {https://www.schneier.com/crypto-gram/archives/2001/0515.html\#3},
author = {{Bruce Schneier}},
month = may,
year = {2001},
@ -242,6 +254,8 @@ This paper's contributions are a summary of the Intel-specific architectural and
@misc{movielabsinc.MovieLabsSpecificationEnhanced2018,
title = {{{MovieLabs Specification}} for {{Enhanced Content Protection}}, v1.2},
urldate = {2018-09-05},
url = {http://www.movielabs.com/ngvideo/MovieLabs_ECP_Spec_v1.2.pdf},
author = {{MovieLabs Inc.}},
month = aug,
year = {2018},
@ -250,7 +264,8 @@ This paper's contributions are a summary of the Intel-specific architectural and
@misc{sonydeveloperworldUnlockBootloaderOpen,
title = {Unlock {{Bootloader}} - {{Open Devices}} - {{Sony Developer World}}},
howpublished = {https://developer.sony.com/develop/open-devices/get-started/unlock-bootloader/},
urldate = {2018-09-05},
url = {https://developer.sony.com/develop/open-devices/get-started/unlock-bootloader/},
author = {{Sony Developer World}},
file = {/home/spiollinux/Zotero/storage/CRIW7H7S/unlock-bootloader.html}
}
@ -266,6 +281,7 @@ This paper's contributions are a summary of the Intel-specific architectural and
@misc{MicrosoftHardwareCertification2014,
title = {Microsoft {{Hardware Certification Policies}} and {{Processes}}},
url = {download.microsoft.com/download/4/D/D/4DD894CD-62C8-488F-944D-4E5F8BA40114/hardware-certification-policies-processes-hck2-1.docx},
year = {2014}
}
@ -273,7 +289,8 @@ This paper's contributions are a summary of the Intel-specific architectural and
title = {Is {{Microsoft Blocking Linux Booting}} on {{ARM Hardware}}?},
copyright = {Copyright 2018 IDG Communications Ltd},
abstract = {Back in September last year, there was a bit of a to-do about Microsoft's UEFI Secure Boot technology in Windows 8, when a Red Hat engineer posted the following:Microsoft requires that machines conforming to the Windows 8 logo program and...},
howpublished = {https://www.computerworlduk.com/it-business/is-microsoft-blocking-linux-booting-on-arm-hardware-3569162/},
urldate = {2018-09-05},
url = {https://www.computerworlduk.com/it-business/is-microsoft-blocking-linux-booting-on-arm-hardware-3569162/},
journal = {ComputerworldUK},
author = {Moody, Glyn},
file = {/home/spiollinux/Zotero/storage/Q9TQHLHG/is-microsoft-blocking-linux-booting-on-arm-hardware-3569162.html}
@ -282,7 +299,8 @@ This paper's contributions are a summary of the Intel-specific architectural and
@misc{matthewgarrettAnnouncingShimReview,
title = {Announcing the {{Shim}} Review Process},
language = {en},
howpublished = {https://mjg59.dreamwidth.org/47438.html},
urldate = {2018-09-05},
url = {https://mjg59.dreamwidth.org/47438.html},
author = {{Matthew Garrett}},
file = {/home/spiollinux/Zotero/storage/FGYE9G6G/47438.html}
}
@ -303,4 +321,27 @@ This paper's contributions are a summary of the Intel-specific architectural and
year = {2015}
}
@inproceedings{swamiyogeshIntelSGXRemote2017,
address = {Las Vegas},
title = {Intel {{SGX Remote Attestation}} Is Not Sufficient},
urldate = {2018-09-18},
url = {https://www.blackhat.com/docs/us-17/thursday/us-17-Swami-SGX-Remote-Attestation-Is-Not-Sufficient-wp.pdf},
author = {{Swami Yogesh}},
year = {2017},
file = {/home/spiollinux/Zotero/storage/GBNIS3SZ/us-17-Swami-SGX-Remote-Attestation-Is-Not-Sufficient-wp.pdf}
}
@misc{corvindavenportNetflixConfirmsIt2017,
title = {Netflix Confirms It Is Blocking Rooted/Unlocked Devices, App Itself Is Still Working (for Now)},
abstract = {Earlier today, Netflix started showing up as 'incompatible' on the Play Store for rooted and unlocked Android devices. However, the app itself continued to... by Corbin Davenport in Applications, News},
language = {en-US},
urldate = {2018-09-19},
url = {https://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/},
journal = {Android Police},
author = {{Corvin Davenport}},
month = may,
year = {2017},
file = {/home/spiollinux/Zotero/storage/TVBERLMS/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now.html}
}