Download presentation
Presentation is loading. Please wait.
Published byColeen Bernice Wilkerson Modified over 9 years ago
1
Physical Media Copy Protection By Wesley Wilson
2
Background Software Developers are shying away from PC game development due to piracy Software Developers are shying away from PC game development due to piracy According to CEO of ID Software Todd Hollenshead: "Piracy has pushed id as being multiplatform" According to CEO of ID Software Todd Hollenshead: "Piracy has pushed id as being multiplatform" Michael Capps of Epic Games says:”PC Gaming is really falling apart. It killed us to make Unreal Tournament 3 cross-platform, but Epic had to do it to [recap its investment in the production costs]." "The market that would buy a $600 video card knows how Bittorrent works." Michael Capps of Epic Games says:”PC Gaming is really falling apart. It killed us to make Unreal Tournament 3 cross-platform, but Epic had to do it to [recap its investment in the production costs]." "The market that would buy a $600 video card knows how Bittorrent works."
3
History of Physical Copy Protection During the 1980s and 1990s, computer games sold on audio cassette and floppy disks were usually protected with a user-interactive method that demanded the user to have the original package or a part of it, usually the manual. Copy protection was activated not at installation but every time the game was executed. During the 1980s and 1990s, computer games sold on audio cassette and floppy disks were usually protected with a user-interactive method that demanded the user to have the original package or a part of it, usually the manual. Copy protection was activated not at installation but every time the game was executed. Sometimes the copy protection code was needed not at launch, but at a later point in the game. This helped the gamer to experience the game (as a demo) and perhaps could convince him to buy it by the time the copy protection point was reached. Sometimes the copy protection code was needed not at launch, but at a later point in the game. This helped the gamer to experience the game (as a demo) and perhaps could convince him to buy it by the time the copy protection point was reached. The most common method: "What is the 13th word on the 7th line of page 22?" The most common method: "What is the 13th word on the 7th line of page 22?" The lenslok system used a plastic prismatic device, shipped with the game, which was used to descramble a code displayed on screen. The lenslok system used a plastic prismatic device, shipped with the game, which was used to descramble a code displayed on screen.
4
Modern Physical Copy Protection CD/DVD copy protection is a set of copy protection mechanisms that prevent users from copying compact discs (CDs) or DVDs. These mechanisms vary widely and include DRM, CD-checks, Dummy Files, illegal table of contents, over-sizing or over-burning the CD, physical errors, bad sectors and more. Many of these protection schemes rely on breaking compliance with the CD and DVD standards, leading to playback problems on some devices. CD/DVD copy protection is a set of copy protection mechanisms that prevent users from copying compact discs (CDs) or DVDs. These mechanisms vary widely and include DRM, CD-checks, Dummy Files, illegal table of contents, over-sizing or over-burning the CD, physical errors, bad sectors and more. Many of these protection schemes rely on breaking compliance with the CD and DVD standards, leading to playback problems on some devices.
5
SecureROM The SecuROM™ copy protection solution consists of two main components: The SecuROM™ copy protection solution consists of two main components: A unique, uncopyable electronic keycode is added to each CD- ROM, DVD-ROM or CD-R during the glass mastering process. Unlike other copy control solutions on the market, the SecuROM keycode is fully within the CD/DVD-ROM specification, thereby ensuring the highest possible compatibility. A unique, uncopyable electronic keycode is added to each CD- ROM, DVD-ROM or CD-R during the glass mastering process. Unlike other copy control solutions on the market, the SecuROM keycode is fully within the CD/DVD-ROM specification, thereby ensuring the highest possible compatibility. An authentication mechanism verifies the unique SecuROM™ keycode and unlocks the encrypted software/application. The authentication mechanism is entirely key-less, meaning no serial numbers, stickers or artwork modification is required. An authentication mechanism verifies the unique SecuROM™ keycode and unlocks the encrypted software/application. The authentication mechanism is entirely key-less, meaning no serial numbers, stickers or artwork modification is required. The SecuROM™ authentication process is completely transparent to original disc users. If SecuROM™ verifies the disc is an original, the encrypted application starts normally. If SecuROM™ determines that the disc is a copy, the application terminates and a customizable error message is displayed. The SecuROM™ authentication process is completely transparent to original disc users. If SecuROM™ verifies the disc is an original, the encrypted application starts normally. If SecuROM™ determines that the disc is a copy, the application terminates and a customizable error message is displayed. More than 200 Million discs protected since 1997 More than 200 Million discs protected since 1997
6
SecureROM DRM Options Disc Based DRM Features Per default SecuROM™ checks for an original disc during every startup of an application. Feel free to customize your protection by selecting either (1) the one time only disc check or (2) periodic disc checks (every certain number of launches or days). Disc Based DRM Features Per default SecuROM™ checks for an original disc during every startup of an application. Feel free to customize your protection by selecting either (1) the one time only disc check or (2) periodic disc checks (every certain number of launches or days). Time Based DRM Features Define the start date and/or end date of your application. Depending on your product requirements, time based DRM features can checked either online (more secure) or offline (more convenient). Time Based DRM Features Define the start date and/or end date of your application. Depending on your product requirements, time based DRM features can checked either online (more secure) or offline (more convenient). Usage Based DRM Features SecuROM™ allows you to limit the functionality. Simply define the number of launches or days after executing the protected application the first time. Usage Based DRM Features SecuROM™ allows you to limit the functionality. Simply define the number of launches or days after executing the protected application the first time.
7
SafeDisc SafeDisc Advanced provides protection against disc copying by encrypting the program executable in an access control wrapper that requires authentication against the SafeDisc signature to run. SafeDisc Advanced provides protection against disc copying by encrypting the program executable in an access control wrapper that requires authentication against the SafeDisc signature to run. SafeDisc v3 uses a key to encrypt the main executable (EXE or DLL) and creates a corresponding digital signature which is added to the CD-ROM/DVD-ROM when they are replicated. The size of the digital signature varies from 3 to 20 MB depending how good the encryption must be. The authentication process takes about 10 to 20 seconds. SafeDisc v3 uses a key to encrypt the main executable (EXE or DLL) and creates a corresponding digital signature which is added to the CD-ROM/DVD-ROM when they are replicated. The size of the digital signature varies from 3 to 20 MB depending how good the encryption must be. The authentication process takes about 10 to 20 seconds.
8
SafeDisc SafeDisc installs its own Windows device driver to the user's computer, named secdrv.sys. In addition to enabling the copy protection, it grants ring 0 access to the running application. This is a potential security risk, since trojans and other malware could use the driver to obtain administrator access to the machine, even if the programs are running under a limited account.device driverring 0 Even worse is that most installers don't set the security configuration appropriately, allowing every user to let the driver configuration point at an arbitrarily chosen executable which (at the next reboot) is started with administrator privileges.
9
SafeDisc
10
StarForce StarForce is a controversial software copy prevention brand by the Russian developer Protection Technology. It is designed for Microsoft Windows. Its main strength lies in wrapping executable and DLL files using byte-code, interpreted through its own virtual machine StarForce is a controversial software copy prevention brand by the Russian developer Protection Technology. It is designed for Microsoft Windows. Its main strength lies in wrapping executable and DLL files using byte-code, interpreted through its own virtual machine StarForce is believed to operate by measuring the physical angle between the first and last written sector on the CD. This hardware signature is identical on all copies pressed from the gold master but is currently difficult to reproduce when burning a duplicate CD. StarForce is believed to operate by measuring the physical angle between the first and last written sector on the CD. This hardware signature is identical on all copies pressed from the gold master but is currently difficult to reproduce when burning a duplicate CD. StarForce also blocks the use of SCSI optical drives when IDE optical drives are present in the system, since most optical drive emulators currently work by simulating SCSI drives. StarForce, however, will authenticate discs from a SCSI optical disc drive if there are no IDE optical disc drives installed in the system. StarForce also blocks the use of SCSI optical drives when IDE optical drives are present in the system, since most optical drive emulators currently work by simulating SCSI drives. StarForce, however, will authenticate discs from a SCSI optical disc drive if there are no IDE optical disc drives installed in the system.
11
StarForce StarForce has received criticism for installing its own device driver onto computers. The StarForce driver, which is installed along with the protected product or when the protected product is first run, is mostly not uninstalled along with the software and cannot be uninstalled using conventional methods StarForce has received criticism for installing its own device driver onto computers. The StarForce driver, which is installed along with the protected product or when the protected product is first run, is mostly not uninstalled along with the software and cannot be uninstalled using conventional methods To address this, StarForce developers later published a removal tool to help untrained users remove the driver. To address this, StarForce developers later published a removal tool to help untrained users remove the driver.
12
Problems With StarForce Has been known to cause optical drives to default to PIO mode Has been known to cause optical drives to default to PIO mode The access control list of the drivers are set such that any user, including those without administrative rights, are allowed to change the association with the executable. Exploitation is simple: The user changes it to point at any arbitrarily chosen executable, which is executed with full system privileges on next reboot. The access control list of the drivers are set such that any user, including those without administrative rights, are allowed to change the association with the executable. Exploitation is simple: The user changes it to point at any arbitrarily chosen executable, which is executed with full system privileges on next reboot. On March 24, 2006, Christopher Spence filed a class action lawsuit on behalf of himself and other gamers against Ubisoft. As a result of that complaint, Ubisoft dropped StarForce. On March 24, 2006, Christopher Spence filed a class action lawsuit on behalf of himself and other gamers against Ubisoft. As a result of that complaint, Ubisoft dropped StarForce.
13
Sources http://www.shacknews.com/onearticle.x/46079 http://www.shacknews.com/onearticle.x/46079 http://www.shacknews.com/onearticle.x/46079 http://www.macrovision.com/products/activereach_games/ safedisc/index.shtml http://www.macrovision.com/products/activereach_games/ safedisc/index.shtml http://www.macrovision.com/products/activereach_games/ safedisc/index.shtml http://www.macrovision.com/products/activereach_games/ safedisc/index.shtml http://en.wikipedia.org/wiki/SafeDisc http://en.wikipedia.org/wiki/SafeDisc http://en.wikipedia.org/wiki/SafeDisc http://en.wikipedia.org/wiki/Ring_0 http://en.wikipedia.org/wiki/Ring_0 http://en.wikipedia.org/wiki/Ring_0 http://en.wikipedia.org/wiki/Copy_protection http://en.wikipedia.org/wiki/Copy_protection http://en.wikipedia.org/wiki/Copy_protection http://en.wikipedia.org/wiki/CD/DVD_copy_protection http://en.wikipedia.org/wiki/CD/DVD_copy_protection http://en.wikipedia.org/wiki/CD/DVD_copy_protection http://www.securom.com/default.asp http://www.securom.com/default.asp http://www.securom.com/default.asp http://en.wikipedia.org/wiki/SecuROM http://en.wikipedia.org/wiki/SecuROM http://en.wikipedia.org/wiki/SecuROM http://www.macrovision.com/products/activereach_games/ safedisc/index.shtml http://www.macrovision.com/products/activereach_games/ safedisc/index.shtml http://www.macrovision.com/products/activereach_games/ safedisc/index.shtml http://www.macrovision.com/products/activereach_games/ safedisc/index.shtml http://en.wikipedia.org/wiki/SafeDisc http://en.wikipedia.org/wiki/SafeDisc
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.