Securing 4k Content - ct20120514 (tjw 15May2012..

SECURING 4K CONTENT
Christopher Taylor
Director of Content Protection
Sony Pictures Technologies
Review of Video Path
(1) Decryption / Decoding Threats
• Attacker extracts Device Key
• Attacker extracts Content Key
• Attacker captures decrypted compressed
content
Content encryption methods (1)
Content
delivery
method
Global
or
unique?
How obtained by
device
Issues
Comments
Disc
Global
Complaint devices can
derive from key block
on disc
Compromise of
a single device
key set breaks
the system
This is how BD is
secured, and is
vulnerable to single
device failure
Disc
Global
Compliant devices are
given key during
online authentication
at first play of a title.
Key is then securely
stored on device for
<n> days
Need an online
connection at
first title
signature. We
think we can
assume this.
Still vulnerable to
single device failure,
but once the device
(type) identified, we
can exclude vulnerable
device types (but can
we really?)
Online
Unique,
per
device
and per
session
During online auth of
the device
Online
connection
required
Some of the content is
only delivered online.
CP can decide if this
content can be cached
by device
Content encryption methods (2)
Content
delivery
method
Global
or
unique?
How obtained by device Issues
Comments
Disc
Hybrid
Use m from n. Key is
encrypted with a key
derived via m from n
method. Compliant
device have m-1
parameters, and get the
m’th online
Not really any more
secure than delivery of
the whole key at online
authentication. But some
mileage here?
Disc
Global
with
diversity
Compliant devices are
given key during online
authentication at first
play of a title. Key is
then securely stored on
device for <n> days
This content will be
expensive – having
different CEKs for
different sku’s and
maybe rev’ing the CEK
every week or for every
1000 discs is not so
expensive,
comparatively. We
should look into the cost
of this.
(1) Decryption / Decoding Mitigations
• Actively monitor for DRM circumventions
• Watermark content to identify source of
leaks
• Automatically revoke devices and/or
device classes used for theft
• Unique obfuscation per Device/Title
• Unique obfuscation per playback session
• Decode in Trusted Execution Environment
(2) Framebuffer Threats
• Attacker captures raw frames from
framebuffer
(2) Framebuffer Mitigations
• Encrypt frame data
• Use protected framebuffer (e.g.
TrustZone)
(3) HDCP Source Threats
• Attacker captures raw frames from hacked
driver
• Attacker captures raw frames from hacked
video hardware
(3) HDCP Source Mitigations
• Require trusted drivers
• Never send unencrypted frame data to
video drivers/hardware
• Only send frame data to protected video
hardware on SoC (e.g. TrustZone)
• Require 3rd party verification of trusted
hardware
(4) HDCP Sink Threats
• Attacker captures video from HDMI to
analog interface
• Attacker creates HDCP stripper with
stolen/generated Device Key
(4) HDCP Sink Mitigations
• Forensically watermark content to identify
HDCP device
• Unique software obfuscation for HDCP sink
session
• Automatic renewal of HDCP devices
and/or device classes used for content
theft
(5) Screen Threats
• Attacker captures video from screen using
camera
(6) Screen Mitigations
• Forensically watermark content to identify
user and playback devices
• Revoke devices that have been used for
content theft