• Corpus ID: 232417526

Looney Tunes: Exposing the Lack of DRM Protection in Indian Music Streaming Services

@article{Dabholkar2021LooneyTE,
  title={Looney Tunes: Exposing the Lack of DRM Protection in Indian Music Streaming Services},
  author={Ahaan Dabholkar and Sourya Kakarla and Dhiman Saha},
  journal={ArXiv},
  year={2021},
  volume={abs/2103.16360}
}
Numerous studies have shown that streaming is now the most preferred way of consuming multimedia content and this is evidenced by the proliferation in the number of streaming service providers as well as the exponential growth in their subscriber base. Riding on the advancements in low cost electronics, high speed communication and extremely cheap data, Over-The-Top (OTT) music streaming is now the norm in the music industry and is worth millions of dollars. This is especially true in India… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 29 REFERENCES
A Case Study on Spotify: Exploring Perceptions of the Music Streaming Service
IntroductionMusic streaming services allow users access to millions of tracks from any web-connected computer legally and free of charge. These services are now viewed as a window into the future of
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services
TLDR
This paper introduces a general memory-based approach that circumvents the protections deployed by popular video-on-demand providers and demonstrates that, by using the technique, it is possible to break DRM protection in a semi-automated way.
Security Analysis of Unified Payments Interface and Payment Apps in India
TLDR
A principled methodology is used to do a detailed security analysis of the UPI protocol by reverse-engineering the design of this protocol through seven popular UPI apps, discovering previously-unreported multi-factor authentication design-level flaws that can lead to significant attacks when combined with an installed attacker-controlled application.
Is DRM working?: how could we tell?
TLDR
Assessing DRM's success requires first determining its place in a copyright landscape that is undergoing a fundamental transformation: that transformation can be described simply as a disappearance of gates, which indicates a different set of threats to DRM schemes, and to the policy embodied in the DMCA.
Pkcs #7: Cryptographic Message Syntax
TLDR
This standard describes a general syntax for data that may have cryptography applied to it, such as digital signatures and digital envelopes, compatible with Privacy-Enhanced Mail (PEM) in that signed-data and signed-and-enveloped-data content, constructed in a PEM-compatible mode, can be converted into PEM messages without any cryptographic operations.
International Federation Of The Phonographic Industry
The International Federation of the Phonographic Industry (IFPI) is a nongovernmental organization (NGO) whose aims are to promote the value of recorded music, safeguard the rights of record
HTTP Live Streaming
This document describes a protocol for transferring unbounded streams of multimedia data. It specifies the data format of the files and the actions to be taken by the server (sender) and the clients
Cryptanalysis of the "Kindle" Cipher
TLDR
This is the first academic cryptanalysis of this cipher and it shows that PC1 is a very weak stream cipher, and can be practically broken in a known-plaintext and even in a ciphertext-only scenario.
Government Publishing Office. [n.d.]. Public Law 105–304–Digital Millennium Copyright Act
  • Retrieved October
  • 2020
Monetization Model (Subscription-based, Advertising-based, and Transactionbased), Streaming Device, Vertical, and Region -Global Forecast to 2024
  • 2020
...
1
2
3
...