For years, Digital Right Management (DRM) systems have been used as the go-to solution for media content protection against piracy. With the growing consumption of content using Over-the-Top platforms, such as Netflix or Prime Video, DRMs have been deployed on numerous devices considered as potential hostile environments. In this paper, we focus on the most widespread solution, the closed-source Widevine DRM. Installed on billions of devices, Widevine relies on cryptographic operations to protect content. Our work presents a study of Widevine internals on Android, mapping its distinct components and bringing out its different cryptographic keys involved in content decryption. We provide a structural view of Widevine as a protocol with its complete key ladder. Based on our insights, we develop WideXtractor, a tool based on Frida to trace Widevine function calls and intercept messages for inspection. Using this tool, we analyze Netflix usage of Widevine as a proof-of-concept, and raised privacy concerns on user-tracking. In addition, we leverage our knowledge to bypass the obfuscation of Android Widevine software-only version, namely L3, and recover its Root-of-Trust.
翻译:多年来,数字权利管理(DRM)系统一直被用作媒体内容保护防止盗版的通向解决方案。随着使用诸如Netflix或Prime Video等超网平台的内容消耗量日益增加,DRM系统被部署在被视为潜在敌对环境的许多设备上。在本文中,我们侧重于最广泛的解决方案,即封闭源的Wibvine DRM。安装在数十亿个设备上,Wibvine依靠加密操作来保护内容。我们的工作展示了对Android的宽域内存研究,绘制其不同组件,并推出与内容解密有关的不同加密密钥。我们以全关键阶梯的方式提供了对Lwicevine的结构性观点。我们开发了宽度Xtractor,这是基于Frida追踪宽域维因功能和截取信息以进行检查的工具。我们利用Netflix使用宽度维因作为概念的验证,并提出了用户跟踪方面的隐私问题。此外,我们利用我们的知识绕过其Orot-Tradestroy-Travevicus3的反光软件版本,即Lrobal-Ly-traview3。