Evaluating New Copy-Prevention Techniques For Audio CDs John A. Halderman 2002 ACM Workshop on Digital Rights Management (DRM 2002) Available at

Slides:



Advertisements
Similar presentations
Rob Farraher Ken Pickering Lim Vu
Advertisements

Intellectual Property Image: William J. Wynn.
© Vera Castleman Software Grade 10. What is software? A program is a collection of instructions to do a job. Programs are collectively known as SOFTWARE.
The digital age of information is not yet a done deal and copyright is not the only potential “block” DRM.
Database Administration and Security Transparencies 1.
Lesson 6 Software and Hardware Interaction
Evaluating New Copy-Prevention Techniques for Audio CDs J. Alex Halderman Princeton University Department of Computer Science.
The Anti-Piracy Campaign: The Drag Behind Their Efforts Jamal Haskin.
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
The Downside to DRM. What is DRM? “Digital Rights Management” Software used to control access to copyrighted material Protect company from piracy.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Lesson 19: Configuring Windows Firewall
Format Scandisk Defragmentation Antivirus Compression Software
Copyright Basics. What is Copyright? Copyright allows authors, musicians, artists, etc. to make money off of their labor. Copyright allows authors, musicians,
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
Chapter 5: System Software: Operating Systems and Utility Programs.
© Folens 2008 Cultural changes in music Brought about by ICT.
Group members Pubudu Dissanayake Imesh Fernando Hasitha Dananjaya Kavindu Dewpura Prasad De Silva.
Chapter 4 Application Software: Programs that Let You Work and Play
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Map Reduce: Simplified Data Processing On Large Clusters Jeffery Dean and Sanjay Ghemawat (Google Inc.) OSDI 2004 (Operating Systems Design and Implementation)
Why do I Need Multiplication? and how can I make it fun to learn?
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Policy-Induced Computer Science Problems? Background for NYU Public Design Workshop Fred B. Schneider Department of Computer Science Cornell University.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Computer Ethics Christina McCorkle.
1 Digital Rights Management Dissenting Argument: Users of Digital Media should obey digital rights management systems to guarantee the integrity and protect.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
… concern the legal ownership and use of intellectual property, such as software, music, movies, data, and information. Links: Video: Too Much Copyright.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Learning Objective Chapter 6 Business Writing Copyright © 2001 South-Western College Publishing Co. Objectives O U T L I N E Developing Written Documents.
Digital Rights Management Maxim Fastovsky. What is DRM? DRM technologies attempt to control use of digital media by preventing access, copying or conversion.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
N a p s t e r. How it all began… Napster began in a college dorm room when a student named Shawn Fanning wanted to share some of his songs with his friends.
Copyright and the Law For more information contact:
Module 1 – Lesson 6 Ms. Tracy. Bell Ringer What is the typical useful life for a personal computer?
Is It Stealing? By Amber Porter. Key Terms  Software licensing- Allowing an individual or group to use a piece of software  Piracy- The unauthorized.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
J. S. PATIL.  The revolution in internet and technology has made the future much more uncertain than most people assume it to be.  People can make money.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Evaluating New Copy-Protection Techniques for Audio CDs J. A. Halderman, 2002 ACM Workshop on Digital Rights Management (DRM 2002). Available at
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
Digital Millennium Copyright Act (DMCA) The Digital Millennium Copyright Act is a United States copyright law that was signed into law by Bill Clinton.
Computer Security By Duncan Hall.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
Digital Rights Management Maxim Fastovsky. What is DRM? DRM technologies attempt to control use of digital media by preventing access, copying or conversion.
Overview of Database Security Introduction Security Problems Security Controls Designing Database Security.
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
Are You a Pirate?. A pirate…. “one who infringes another’s copyright or business rights or who broadcasts without authorization”
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Copyright Quiz How Well Do You Know Copyright?. Copyright Quiz: True or False Only materials with a copyright symbol,©, are protected. If it doesn’t have.
BY JENNA SAUDER SLIDE OVERVIEW This presentation will discuss the following This presentation will discuss the following : What a Virus is… How a Virus.
12/16/07/10 – Preparatory Measures before Trade Fairs in DE HG Preparatory/Preventive Measures before Exhibiting at Trade Fairs in Germany Heinz.
windows
A GUIDE TO COPYRIGHT & PLAGIARISM Key Terms. ATTRIBUTION Identifying the source of a work. For example, a Creative Commons "BY" or attribution license.
Copyright Computer crime and cyber security.
Evaluating New Copy-Prevention Techniques for Audio CDs
Chapter 14: Protection Modified by Dr. Neerja Mhaskar for CS 3SH3.
How to remove DRM protection from your iTunes movie Firstly, it is important for you to know more about what exactly is DRM. DRM refers to Digital Rights.
Social, Legal, and Ethical Issues for Computing Technology
By Jake Schmitt, Seth Raleigh, Neil McLain
Intellectual Property Rights
Copyright, Designs and Patents Act 1988
The Legalities of Technicalities task 4
Presentation transcript:

Evaluating New Copy-Prevention Techniques For Audio CDs John A. Halderman 2002 ACM Workshop on Digital Rights Management (DRM 2002) Available at (March 2003) Simon Fisher

Summary The article gives a brief discussion of copy-prevention and copyright issues Outlines and conducts an experiment with 3 forms of copy-protection –Are they effective? –How do they work? –Can they be defeated? Concludes that the techniques are harmful to legitimate users

The Experiment Three CD’s with different forms of copy- protection –The study was “constrained by the small number of recordings known to emply copy-prevention techniques” Various combinations of hardware and software –Operating Systems –CD Drives –Playing / Copying / Ripping utilities

Are they effective? Results showed the techniques were effective –Of 75 trials, only 13 were successful –Successful meaning that all tracks “played, extracted, or copied correctly”.

How do they work? By exploiting weaknesses in hardware and software –Table of Contents errors Incorrect track type / times Non-existent tracks –Multiple Session Bugs By having fictitious or invalid extra sessions, can confuse software and/or hardware

Can they be defeated? Yes, by making the software and hardware used more robust to errors In fact they already have –“A quick search on the Kazaa and Gnutella file trading networks in May 2002 revealed copies of nearly every track freely available for downloading.” Once hardware becomes robust enough, software fixes will be too rapid for these kinds of techniques to be feasible

Conclusions Halderman concludes that as these techniques are so easily circumvented, their only effect is to irritate legitimate owners And may encourage people to avoid copy- protected CD’s and/or turn to piracy “These ill-conceived schemes will amount to little more than a temporary speed bump for copyright infringement and promise to further alienate [legitimate] customers from the record industry.”

Critical Comments Confusion over ‘effectiveness’ –Halderman says the copy-prevention techniques are effective, but then also states they can be easily circumvented. –He never really defines what kind of people the copy-prevention techniques are effective against. Advanced users who can use more sophisticated software Or people who may not have much experience with computers.

Critical Comments I don’t think the techniques studied are as ineffective as the article claims –Many owners of these copy-protected CD’s may not know how to use the software that can bypass the protection –Nearly all of the tests under Windows failed –Hence the techniques are at least partially successful

Appreciative Comments Haldermans point about copyright lifetimes –Copyright provides a limited monopoly as an incentive for the authors’ time and effort –But only for a limited period of time –If these copy-prevention techniques worked, they would essentially create a permanent copyright

Question The copy-prevention techniques studied were circumvented soon after they were released But it may require a certain degree of expertise in order to bypass them How successful would you say these techniques were, in terms of slowing or preventing illegal distribution?