Looney Tunes: Exposing the Lack of DRM Protection in Indian Music Streaming Services
@article{Dabholkar2021LooneyTE, title={Looney Tunes: Exposing the Lack of DRM Protection in Indian Music Streaming Services}, author={Ahaan Dabholkar and Sourya Kakarla and Dhiman Saha}, journal={ArXiv}, year={2021}, volume={abs/2103.16360} }
Numerous studies have shown that streaming is now the most preferred way of consuming multimedia content and this is evidenced by the proliferation in the number of streaming service providers as well as the exponential growth in their subscriber base. Riding on the advancements in low cost electronics, high speed communication and extremely cheap data, Over-The-Top (OTT) music streaming is now the norm in the music industry and is worth millions of dollars. This is especially true in India…
Figures and Tables from this paper
References
SHOWING 1-10 OF 29 REFERENCES
A Case Study on Spotify: Exploring Perceptions of the Music Streaming Service
- Art
- 2013
IntroductionMusic streaming services allow users access to millions of tracks from any web-connected computer legally and free of charge. These services are now viewed as a window into the future of…
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services
- Computer ScienceUSENIX Security Symposium
- 2013
This paper introduces a general memory-based approach that circumvents the protections deployed by popular video-on-demand providers and demonstrates that, by using the technique, it is possible to break DRM protection in a semi-automated way.
Security Analysis of Unified Payments Interface and Payment Apps in India
- Computer ScienceUSENIX Security Symposium
- 2020
A principled methodology is used to do a detailed security analysis of the UPI protocol by reverse-engineering the design of this protocol through seven popular UPI apps, discovering previously-unreported multi-factor authentication design-level flaws that can lead to significant attacks when combined with an installed attacker-controlled application.
Is DRM working?: how could we tell?
- Political ScienceDRM '11
- 2011
Assessing DRM's success requires first determining its place in a copyright landscape that is undergoing a fundamental transformation: that transformation can be described simply as a disappearance of gates, which indicates a different set of threats to DRM schemes, and to the policy embodied in the DMCA.
Pkcs #7: Cryptographic Message Syntax
- Computer Science
- 1997
This standard describes a general syntax for data that may have cryptography applied to it, such as digital signatures and digital envelopes, compatible with Privacy-Enhanced Mail (PEM) in that signed-data and signed-and-enveloped-data content, constructed in a PEM-compatible mode, can be converted into PEM messages without any cryptographic operations.
International Federation Of The Phonographic Industry
- Economics
- 2010
The International Federation of the Phonographic Industry (IFPI) is a nongovernmental organization (NGO) whose aims are to promote the value of recorded music, safeguard the rights of record…
HTTP Live Streaming
- Computer ScienceRFC
- 2017
This document describes a protocol for transferring unbounded streams
of multimedia data. It specifies the data format of the files and the
actions to be taken by the server (sender) and the clients…
Cryptanalysis of the "Kindle" Cipher
- Computer Science, MathematicsSelected Areas in Cryptography
- 2012
This is the first academic cryptanalysis of this cipher and it shows that PC1 is a very weak stream cipher, and can be practically broken in a known-plaintext and even in a ciphertext-only scenario.
Government Publishing Office. [n.d.]. Public Law 105–304–Digital Millennium Copyright Act
- Retrieved October
- 2020
Monetization Model (Subscription-based, Advertising-based, and Transactionbased), Streaming Device, Vertical, and Region -Global Forecast to 2024
- 2020