Let’s imagine that a new movie has just been released online. Movie lovers have been waiting for the release for months, and the creators and distributors of the film are expecting to turn a sizable profit. But within hours of the release, people start to make their own copies of the film, flooding the internet with pirated copies and cutting into the creators’ and distributors’ earnings.
Digital rights management (DRM) solutions were created to prevent that kind of scenario. These solutions control who can access and share content and the ways in which that content can be used. However, while DRM solutions can be pretty effective at preventing unauthorized use of media content, they face their own security challenges that can reduce their effectiveness. This post will examine those challenges and a few of the techniques that attackers use to bypass DRM protections.
But first, let’s take a closer look at the use of DRM solutions and the security benefits they provide.
An easy way to think about DRM is as a suite of technologies designed to safeguard media content such as movies, music, and e-books. DRM solutions aim to ensure that creators and copyright holders retain their rights and to prevent bad actors from accessing and distributing content. For example, when you attempt to stream a movie on a platform like Netflix, DRM technology ensures that you can watch it only on an authorized device, in a certain region, and for a limited time.
There are two main types of DRM solutions: hardware based and software based. The primary difference between the two types of systems is the environment in which the most sensitive DRM-related processes are executed. In a hardware-based solution, decryption, decoding, and video-processing operations are executed in a secure hardware component, a trusted execution environment isolated from the rest of the system. In a software-based solution, decryption is handled at the software level by a content decryption module (CDM). Hardware-based solutions are generally considered more secure and more resistant to attack. In fact, some streaming platforms limit the playback of high-definition content to devices that offer hardware DRM support or meet certain security requirements.
From a user perspective, the process of streaming a DRM-protected movie on a platform like Netflix or Hulu seems pretty simple: You fire up the platform, pick a movie to watch, and hit “play.” But behind the scenes, things are much more complicated. Before you can start your streaming session, the streaming client (that is, the platform) must verify that you’re authorized to watch the content and then decrypt it.
Although all DRM solutions have the same ultimate goal—to prevent unauthorized access to content—the exact techniques they use can vary pretty widely. Nevertheless, the process of streaming DRM-protected content generally goes something like this:
While DRM plays a crucial role in the protection of digital media content, it’s not without its flaws. Of course, some DRM solutions, such as hardware-based systems, are more secure than others and may be resistant to more basic attacks. However, even if a DRM solution does everything “right,” attackers motivated by the profitability of digital piracy may still be able to find exploitable weaknesses—and compromise the protections that the solution is meant to provide.
Let’s explore some of the common techniques that attackers may use to compromise DRM solutions.
VMs present unique security challenges for DRM systems because they can enable attackers to control execution environments in ways that aren’t possible on physical machines. For example, an attacker running a VM can modify and inspect every aspect of the system, including its memory, the behavior of its processor(s), and its system calls. Thus, by running a DRM-protected application in a VM, an attacker could gain the ability to bypass checks that would otherwise prevent the attacker from tampering with the DRM solution. If successful, the attacker could then attempt to slow down the execution of the DRM solution’s processes and carefully analyze its decryption functionality, which could assist the attacker in reverse-engineering or debugging the DRM solution.
Modern DRM systems often attempt to prevent VM-based attacks by implementing virtualization detection mechanisms such as checks for hypervisors (a.k.a. VM monitors). However, those mechanisms are not foolproof, and some VMs can be configured to evade detection.
In 2016, two Ben-Gurion University cybersecurity researchers announced that they had discovered a stream-ripping vulnerability in Google Chrome’s implementation of the Widevine DRM solution, which Google owns. Widevine offers three levels of security: In level 1, its highest security level, “all operations involving video rendering, hardware-level decryption, and content decoding” are executed in a trusted execution environment. By contrast, its level 3 offering is a “software-only security solution” in which decryption operations are carried out in a CDM. Currently, level 3 is the only level supported by the Chrome desktop browser.
The vulnerability allowed the researchers to capture and copy decrypted content in transit from the Widevine CDM to the Chrome media player and to then save that content. In other words, it allowed them to engage in stream ripping. (See Wired’s post on the vulnerability to learn more and to view the proof-of-concept exploit developed by the researchers.)
So what’s the solution to the challenges that DRM technologies face?
Is it even possible to safeguard content and stay one step ahead of attackers?
Fortunately, the answer is yes—but not through DRM alone. Organizations that use DRM must take a holistic approach to security and assess their DRM implementations from the perspective of attackers. They need to remain alert to emerging threats and view DRM as just one of the many tools in their security toolbox.
Otherwise, they may find their valuable creations lost in a sea of pirated content.
At ISE, we understand how attackers think—and we know how to stop them. To learn more about the attacker mindset and the cybersecurity services that we offer, get in touch with one of our security experts today.