CD DVD Copy Protection, Tim Guneysu
CD DVD Copy Protection, Tim Guneysu
Tim Guneysu
02/12/2004
Contents
1. Introduction
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
2
2
3
4
4
5
6
6
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
8
8
8
9
10
10
10
4. Protection Implementations
4.1. Protecting Data on CD-ROMs . . . . . . . . . . . . . . .
4.1.1. Suitable Approaches for Data Protection . . . . .
4.1.2. Implementations providing Data Protection . . .
4.1.3. Eciency of recent Data Protection Mechanisms .
4.2. Protecting Audio Content on CD-DAs . . . . . . . . . .
4.2.1. Suitable Approaches for Audio Protection . . . .
4.2.2. Implementations providing Audio Protection . . .
4.2.3. Eciency of recent Audio Protection Mechanisms
4.3. Protecting Data on DVD-ROMs . . . . . . . . . . . . . .
4.3.1. Suitable Approaches for Data Protection . . . . .
4.3.2. Implementations providing Data Protection . . .
4.3.3. Eciency of recent Data Protections . . . . . . .
4.4. Protecting Video Content on DVD-Video Disks . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
11
11
11
11
14
14
15
15
15
17
17
17
17
18
Data Medium
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
ii
Contents
4.4.1. Suitable Approaches for Video Protection . . . . . . . . .
4.4.2. Implementations providing Video Protection . . . . . . . .
4.4.3. Eciency of recent Video Protection Implementations . . .
18
18
18
5. Legal Aspects
5.1. Digital Rights Protection in Germany . . . . . . . . . . . . . . . .
5.2. Circumventing Copy Protections . . . . . . . . . . . . . . . . . . .
20
20
20
6. Conclusions
21
A. Appendix
A.1. Listing of CD Protections . . . . . . . . . . . . . . . . . . . . . .
A.2. Listing of CD & DVD Protections . . . . . . . . . . . . . . . . . .
22
22
28
1. Introduction
This paper was written for the advanced seminar CD and DVD Copy protection
accomplished during the authors ITS master studies at the Ruhr-Universitat
Bochum. It represents an overview about mechanisms, technologies, and available
implementations for protecting optical media discs as a widespread commodity
against further and uncontrolled replication.
It will further outline options how to circumvent and deactivate copy protections
of optical media - but of course without giving details. This report denitely
refuses to be considered as some sort of a hackers guide to rip contents illegally
from Compact Disks (CD) and Digital Versatile Disks (DVD).
As a rst step in the jungle of protection systems, this paper will commence
to classify and assess the operation and performance of several copy protection
schemes.
But to do so, it is required to start with introducing the reader to the limitations and specication of the considered media. This information will barely
be necessary for understanding the dierent variants of hardware based copy protections.
The next topic is dedicated to available protections suitable for preventing a
CD from being duplicated without authorization. This chapter will also discuss diverse implementation approaches to assess their means and eectiveness.
This includes a presentation of ways how to break inecient CD based protection mechanisms. To accommodate with the dierent options for CD contents like
data and audio, an evaluation will be performed separately of both content types.
Accordingly, the DVD as second medium is analyzed using same criteria as already determined for CD evaluation.
As a last important fact, the legal aspects of making copies of protected and
unprotected media and the employment and development of tools to support this
action is highlighted in a separate chapter. The discussion of regulations in public laws will give a clue if authors and originators of content and software will
receive backup support by a countrys legislative. For simplicity, this part will
only relate to German laws.
Finally, the employment of copy protections for optical media will be discussed
as a whole in respect to options what needs to be improved and if it makes sense
to ship products with copy protections.
2.2 CD Specifications
2.2. CD Specications
On a CD the data is stored in a helix of pits and lands where pits are about
0.12 microns deep and their length varies from 0.8 microns minimum (3 units in
length) to 3 microns maximum (11 units in length) depending on the data. The
laser which will read out the bits represented by pits and lands operates on a
wave length of 780 nm [Ser02a].
The data is arranged in sectors which are the smallest addressable unit for a
CD-ROM device operating according to Yellow Book specication. Each sector
itself is composed out of 98 frames which build a subunit containing basic data
segments like a laser synchronization area, a set of subchannels or control code,
24 bytes of data payload and an error correction code. Frames are intricately
interleaved so that damage to the disk will not destroy any single frame, but only
small parts of many frames [Sto00].
An important role for copy protection systems is due to the subchannels. They
are dened as eight separate one bit channels, each designated by a character
from P to W. The subchannels are important for dening the Lead-In, Lead-Out
and Track areas of a disk (P-Channel) as well the complete TOC or the remaining
time index (Q-Channel). It should be annotated that not all subchannels are in
use (R-W are usually empty for most formats).
After having shortly discussed the physics of the disk dye, it is evident to highlight
the logical disk structure next. Several dierent formats for arranging data on
CDs have been dened. Those books of the Compact Disk family were named
for the color of the binder covers in which the specication was issued. Red
Book is the specication for CD Audio, Yellow Book is CD-ROM, Orange Book
is CD Recordable, Green Book is CD interactive (CD-i), Blue Book is Enhanced
CD, and White Book is Video CD. All of these books are based on the Red
Book physical disk specication, but some also dene the types of content the
disk may contain, such as 44.1 MHz PCM audio for Red Book, and MPEG 1
video for White Book. Other disk formats, such as Mixed Mode or HFS, do not
have books, but are logical variations of one or more of the book formats. For
example, the Yellow Book denes CD-ROM as far as the physical characteristics
of the disk, addressing schemes, and error correction are concerned, but the le
system and type of content can be user dened. A Yellow Book disk could use the
HFS le system, the ISO 9660 le system, or a user-dened le system, and could
contain text, raw data, or multimedia elements. As copy protections are usually
only deployed on Red and Yellow Book CDs, those standards will be subject of
investigation in the following.
the TOC, Lead In, Program area, Lead Out, and basic error correction. But the
next level of Yellow Book reorganizes the frames dened in Red Book into sectors
(98 frames, or 2,352 bytes per sector) and adds another layer of error detection
and correction. The extra error correction information, at 288 bytes per sector,
plus 12 bytes of sync and 4 bytes of header, reduces the available sector space for
user data to 2,048 bytes. Addresses of sectors are expressed as minutes, seconds,
and sectors (MM:SS:SS). Yellow Book stops there, however, leaving it up to the
CD-ROM developer to decide how to arrange sectors into logical blocks and logical blocks into les. And that is the rst step into the complexity of CD, in the
form of Mode 1 and Mode 2.
The Yellow Book specication denes two data structures: Mode 1 and Mode
2. The mode byte, which is included in the header eld of a CD-ROM sector,
describes the type of data contained in the data eld. Mode 1 denotes CD-ROM
data with Error Correction Code (ECC), which provides space for 2,048 bytes of
user data in each frame. It is the mode used to store data that is unforgiving of
error, like computer programs or databases. Mode 2 denotes a sector with data
stored without ECC, which provides more room (2,336 bytes) for user data, but
which is typically used for data that is more tolerant of error, like audio, video,
or graphics [Ser02a].
It is important to note the ability of Yellow Book to manage multi-sessions.
Multi-session means to continue writing data to a CD though a previous recording
session was already applied and nished. This feature is very useful especially
considering when appending additional les to a le system residing on an optical
disk later on.
2.3.1. DVD-ROM
The DVD-ROM was designed to have logical characteristics similar to the CDROM. The main intention for the development process was to achieve a medium
with more capacity than a CD-ROM but the same features. But it is not that
simple. The lesystem ISO 9660, which is commonly used for CD-ROMs, is capable of addressing 4GB of sectors. At 2,048 bytes of user data per sector, that is
around eight terabytes of addressable data in a single volume. Furthermore, ISO
9660 is capable of addressing a maximum le size of 4GB. However, in the realworld implementations of ISO 9660, drivers and redirectors such as MSCDEX
and CDFS are capable of addressing only 2GB of data, and les of up to 2GB in
size. This 2GB limitation is not exclusively the property of CD-ROM, however,
most operating systems are limited to reading 2GB as a restriction of a 32-bit
system.
The new le system that DVD-ROM uses is a ocially dened as ISO 9660
and Micro UDF; however, there may be good reasons to leave ISO 9660 behind
when making the move to DVD. UDF is capable of addressing 18 quintillion, or
18 billion bytes of data. That seems sucient for nowadays, and most of our
future needs, certainly. But the real beauty of UDF is that it can oer the true
cross-platform universality that ISO 9660 attempted.
2.3.2. DVD-Video
DVD Video is identical to DVD ROM up to the application level. For DVD
Video, the application layer is dened as the type of video codec, audio compression, navigational commands, auxiliary les, and other data types it may contain.
Only a DVD disk that conforms to these denitions will play on a DVD Video
player. If a DVD-ROM disk not developed to the DVD Video application layer
was inserted into the player, the player would not recognize it as a DVD.
The DVD Video specication is by far the most detailed, largest, and most restrictive of the DVD format books, and far beyond the scope of this report to
cover in detail. The format denes MPEG 2 variable bit rate video, alternate
camera angles, multiple aspect ratios, interactive menus with chapter breaks,
parental, presentation, and navigational controls; Dolby AC-3, MPEG 2, or Linear PCM audio; Stereo or Surround Sound; up to eight sound tracks (for foreign
languages); and 32 subpicture streams (for subtitles). The output from a DVD
Video disk is not an MPEG 2 digital video stream, but a stream of all of these
elements multiplexed together. In addition, most DVD Video discs use Macrovision Colorstripe encoding for digital to analog copy protection, and CSS (Content
Scrambling System) encryption to prevent digital to digital copying. The latter
type of copy protection will be highlighted more thoroughly in the next chapters.
is read as well from the original with the only dierence that this operation is
dedicated to create another copy. But how is it possible for the optical system to
detect if the data is just used for its intended purpose or is going to be replicated?
A second requirement is that the copy protection must guarantee availability of
the medium, this means the protection may not inuence its compatibility in
respect to be played in various environments and devices.
Third, due to the fact that a CD is considered as a commodity, a protection mechanism may not increase the production costs in a signicant manner. Otherwise,
if the nancial additional burden to aord the protected CD for a customer is
unacceptably high, he or she might feel especially forced to obtain the content
illegally by private duplication.
It is rather obvious that all requirements contradict each other resulting in a
need for a trade-o between protection benets, nancial eorts and compatibility issues. Having highlighted the requirements for protection mechanisms, the
next step is to classify the dierent types and ways how to reduce the threat for
undesired medium replication.
The techniques for protection can be organized to four dierent avors and
protection classes, respectively:
Abusing the Medium Specication (A)
Intentionally Injecting Read Errors (B)
Verication of the Original (C)
Digital Signatures and Cryptography (D)
The protection classes will dier in their eciency and additional cost - in
monetary and computational sense. The means to apply such a copy protection
class to an optical disk is described by the following sections.
10
stuck.
This is denitely the most naive approach to protect a medium, but of course it is
on the other hand a rather cheap way as it just requires some minor modications
to the format of the original disk. By the way, this protection type using format
deviation is a very simple technique and is usually only applied for protecting
Red book or audio CDs.
4. Protection Implementations
The following chapter will discuss recent implementations of copy protections.
For a better overview it will highlight protections for CDs and DVDs separately.
12
Protection Implementations
of entire frames by playing around with the sync pattern of each frame which
will cause the disk drives laser to lose synchronization while following the data
helix. Where an unqualied correction code might still be copied using a raw
copy mode of a replication device, a loss of synchronization on the medium will
usually cause a failure of the copy process when a sequential read is attempted.
Another technique of class (B) protection is the use of so called Weak Sectors.
At rst sight weak sectors look like a collection of useless data. The data consists
of a sequence of zeros but it also has special sector groups containing a regular bit pattern. Reading this data with a CD-ROM will work perfectly in all
CD-ROMs and CD-recorders. A regular pattern like this will appear similar to
XYXYXYXYXYXY.
13
areas, dierent CD-R types, etc. This kind of protection was published and implemented by the CD-Cops protection from the Link Data Security Labs [Gam03a].
A quite simple but eective approach is taken in Sonys SecuROM [Son03]. A
specic check routine probes for the existence of a so called pregroove area which
is only present on CD-recordables. The pregroove for CD-R is used to dene
its size, vendor, maximal recording speed, etc. If such an information block is
found, it is for sure that the underlying medium is a CD-R copy. Another class
(B) option yields the usage of prepared masters containing already a precompiled
session which cannot be copied by conventional techniques. A software module
again can check for the presence of this session and in case that it is not found
instantly exit with an error message. This technique is implemented by the Hexalock copy protection [Hex03].
But an immediate shutdown is not the only possible way for a copy protection
mechanism to behave. The Fade protection is preferring a gradual loss of features after the rst time a startup from a duplicated disk was performed [Cod01].
Thus, a game based on the Fade protection system, will rst show up all features
and will then reduce its options with the time, e.g. suddenly it is not possible
to raise more funds in an economic game or to trigger the grenade launcher in
an Ego-Shooter game. Psychologists promise this to be the more annoying and
sustaining type of copy protection causing the owners of the replica to buy the
game with a greater probability than without the gradual loss of features. An
abrupt termination is considered to provoke more eorts to break the copy protection than this silent way.
The protection class (D) is concerned about digital signatures and cryptography. It is important to emphasize that all keys and signatures must be placed
on the medium itself reducing its security quite dramatically. For common and
standardized CD-ROM devices with no support to advanced cryptography, this
will only represent a rather weak solution to protect the disk content, because
it means that the key encrypting the content must be placed somewhere on the
medium in plain text. The only option to complicate a direct extraction of the
cryptographic element from the medium is to hide it away very securely either
in the disk subcodes or between defective sectors. A specic software wrapper is
responsible to extract the hidden key from the disk and thereafter decrypt the
content using that gathered code.
Currently, there are some implementations available incorporating this type of
protection mechanism. SafeDisk [Mac01] and Securom [Son03] are the most famous representatives of this kind.
14
Protection Implementations
15
16
Protection Implementations
17
18
Protection Implementations
19
5. Legal Aspects
5.1. Digital Rights Protection in Germany
Since September 2003 the German legislature has released new laws to protect
copyright holders. This act was mandatory to meet the previously adopted European directives to improve the legal situation for intellectual property [dJ03].
Although not all postulated details by the EU were already realized in this change
of statutes, copyright holders may be pleased nevertheless.
The balance of what is allowed and prosecuted since September 2003 has been
denitely shifted in their favor, cutting o rights of the end-user.
6. Conclusions
Drawing a nal conclusion about the facts, it will reveal that copy protection, in
spite to what their names might imply, does only represent a way to complicate
the creation of a working duplicate. Therefore, some vendors avoid the terminology of copy protection and use a weaker expression of copy control systems
instead.
The actual intention is only to frustrate most people who attempt to create a
simple one-to-one pirate copy from a borrowed medium. It is true that most
copy protection mechanisms have already been broken, for many of them even
exist generic patches or step-by-step circumvention strategies which mean only
insignicant additional eort for a common user who considers a medium replication.
The analysis of this situation clearly shows that only a complete framework of security measures may create a solution which is absolutely secure against copying.
The greatest problem of the current approach is that the authorization infrastructure based on stand-alone players with no secured interfaces is absolutely
inadequate to support an unbreakable solution. It is easily possible to rip o the
music from a CD-DA using a digital output of the CD-player which is plugged
into the digital input jack of a computers sound card. A solution to this might
come with the Content Protection System Architecture as proposed by the 4C
(IBM, Intel, Matsushita, Toshiba) including encrypted interfaces and connections
combined with a better key management than CSS is currently using [Ent00]. As
long as such an or similar approach will be realized, optical disk media are hardly
to prevent from becoming subject of piracy. Another point of criticism is the
realization of compatibility. As postulated by a requirement in the beginning
of this paper (compare chapter 3.2), copy protection should be designed to keep
compatibility to every type of replaying hardware. This is unfortunately not true,
especially for class (A) protections. There are quite a signicant number of player
implementations on the market which are getting dazed by copy protections as
well as resulting in reasonable enragement of customers. Besides the fact that
copy protection are only useful in very limited dimensions, there are known facts
that they even change the customers attitude when considering to buy a copyprotected CD when he or she might risk that the newly aorded disk will not
operate in his or her environment.
A. Appendix
A.1. Listing of CD Protections
CD-Cops
CD-Cops is an envelope protection which is added to the CDs main executable.
Minute dierences are measured to establish the CD-ROMs ngerprint and to
ensure that copies are not accepted. This ngerprint is usually expressed as an
8-digit code or key number. The CD-Cops software which recognizes and either
accepts or rejects the CD is protected by Links Code Security, a system which
has been in use since 1984 [Gam03b].
Protection Class: C
Backup Solution: Use CD-Cops Decryptor to determine new CD-Code from backup copy
Vendor: Link Data Security
Website: http://www.linkdata.com
CD-Protect
CD-Protect works on the principle of direct hardware coding on the CD-ROM.
While trying to read a CD master treated as described, unreadable sectors are
reported. These areas cannot be copied to the hard drive without further intervention of the operating system (Windows 9x/Me/2000/XP). The attempt to
read the CD with a copying software is either directly terminated or takes up
to several hours. Copying to a blank CD is thus hardly possible with the copy
protection [Gam03b].
Protection Class: B
Backup Solution: Use DAO-Copy with defective sector skipping and patch the software accordingly
Vendor: Software & Protection Beisheim e.K.
Website: http://www.holgerbeisheim.de
23
CD-Shield SE
CDSHIELD protects/modies a CD-Image by adding sector-errors before it is
burned to a CD-R. This prevents people from making a backup [Gam03b].
Protection Class: B
Backup Solution: As this is a very low-budget solution most advanced backup software should
work
Vendor: Mindestworx
Website: http://www.mindestworx.fr.st
FADE
Codemasters anti-piracy initiatives receive an additional push with the introduction of FADE, a PC-based piracy protection system that can degrade gameplay
if a counterfeit copy of the game is identied as being played. Codemasters has
equipped the computer game Operation Flashpoint with embedded coding that
can recognize the dierence between counterfeit and real copies of the games CD.
If a pirate CD is identied, the game automatically disables key gaming features
[Gam03b].
Protection Class: C
Backup Solution: Software patches will be required to remove/disable the protection.
Vendor: Codemasters
Website: http://www.codemasters.com
24
Appendix
HexaLock CD-RX
HexaLock CD-RX media are specially made CD-Rs that contain a precompiled
session, which includes security elements that make the disks copy protectable.
The program les are linked to these security elements during the recording process, thus creating a copy-protected CD-R. The authorized mastering process
can be done in one-o mode, or in an automated mode in selected duplication
systems [Gam03b].
Protection Class: C
Backup Solution: Software patches will be required to remove/disable the protection.
Vendor: HexaLock
Website: http://www.hexalock.com
LaserLock
Laserlock uses a combination of encryption software and unique laser marking
on the CD surface made during the special LaserLock mastering procedure, in
order to make copying practically impossible. Every CD-ROM application has
a unique locking parameter that provides a complete protection against illegal
re-mastering and reproduction. LaserLock oers protection for every application
dierently as each application package is characterized by a unique encryption
parameter that is specied during LaserLocking procedure [Gam03b].
Protection Classes: C, D
Backup Solution: Use either a generic LaserLock reader or simply copy the disk using a raw data
mode
Vendor: MLS LaserLock International
Website: http://www.laserlock.com
LockBlocks
The LockBlocks protected CDs have 2 circles, one about 5 mm, the other 3 mm,
which cause a CD-Reader/Writers to lockup when being read. Unfortunately,
more is not known about this type of copy protection [Gam03b].
Protection Classes: B, C
Backup Solution: Software patches are needed to get around this protection.
Vendor: Dinamic Multimedia
Website: http://www.dinamic.com
25
Phenoprotect
Phenoprotect produces read errors directly on the CD-ROM in areas which do
not contain any game data, but can be checked by programs. CD Writers report
these as unreadable sections. These areas cannot be copied to the hard drive.
The specic software, e.g. the game and the InstallShield used for installation
can, however, contain instructions from the software manufacturer to check this
erroneous data, if this data is not found when the program starts, it is not an
original version and the game or installation is terminated.
Windows 9x operation systems cannot read the erroneous sections. Any attempt to copy will result in the operation system aborting the process [Gam03b].
Protection Class: B
Backup Solution: Raw disk copy and software patches are required.
Vendor: CodeCult
Website: http://www.codecult.com
RingProtect
A visible circle is added to the CD, with which users can distinguish between an
original and a pirated copy at a glance.
Several checks are added in order for the software to be able to check the les
in the visible circle, and when not found the application should deny to function. The les which are located inside the visible circle are designed not to be
copied, since the circle origin cannot be exactly replicated on known CD-R media.
Furthmore, it will take many hours for a CDRW to read the Ring PROTECH
protected CD, and eventually it will malfunction [Gam03b].
Protection Class: B
Backup Solution: Raw disk copy mode of advanced backup software is required to copy those
CDs.
Vendor: ED-CONTRIVE
Website: http://www.ed-contrive.co.jp
Roxxe
Roxxe CD protection is a combination of hardware and software protection that
should make it impossible to run software from illegally copied CDs [Gam03b].
The vendor of Roxxe promises the following basic requirements:
The original software is modied so that it will not run, without the specic
action of the guard module.
26
Appendix
The guard module recognizes the original CD-ROM, without this detection
the application will not run or will run under considerable restrictions.
Physical key is present on the CD-ROM. This key should not be reproducible, either by disk copying using a CD writer or professional remastering to a silver CD.
Protection Classes: B, C, D
Backup Solution: Not yet published
Vendor: Electronic Publishing Association LLC
Website: http://www.roxxe.cz
SAFECAST
Macrovision SAFECAST is designed to help developers and publishers protect
their pre-release software from unauthorized copying. It uses a software-based
encryption toolkit that is made available to the publisher in order to allow complete control of the encryption process. When a publisher encrypts the gold disk
they can distribute it directly to end users who are then required to contact the
publisher directly or via a web site to obtain access keys to play the program.
The access keys are a cheaper substitute for hardware dongles or other security
mechanisms which often interfere with playing a particular pre-release program
[Gam03b].
Protection Class: D
Backup Solution: Not yet published.
Vendor: MacroVision
Website: http://www.macrovision.com
27
SmarteCD
The SmarteCD technology is designed to encrypt and embed an identifying black
hole within the content of each individual product CD resulting in technology
that should distinguish an original, properly licensed CD from a forgery. At the
point of CD replication or duplication, SmarteCD physically alters the CD media
preventing it from duplication or digital reproduction [Gam03b].
Protection Classes: C, D
Backup Solution: A one-to-one backup will seem to be working at once, but requires additional
software patching as the protection will recognize the duplicate at some point during execution.
Vendor: Smarte Solutions
Website: http://www.smartesolutions.com
SoftLock
SoftLock aects each CD-ROM title with a unique locking parameter, namely a
protection code and special mark, consisting of defective errors.
SoftLock uses a combination of:
Encryption software
Unique serial marking on the CD made during mastering procedure.
Special arrangement of les in TOC.
This type of protection makes use of virtually all protection classes [Gam03b].
Protection Classes: A, B, C, D
Backup Solution: Not yet published
Vendor: Assel
Website: http://www.soft-lock.com
28
Appendix
DVD-Cops
The DVD-Cops protection is added directly to the main executable before the
actual DVD is pressed. After this a unique access code is extracted from the DVD
which enables the user to install the DVD. From then on, the software should
run only when the original DVD is present in the drive [Gam03b].
Protection Class: C
Backup Solution: Not yet published, but probably similar to CD-Cops mechanism.
Vendor: Link Data Security
Website: http://www.linkdata.com
SecuROM
SecuROM is a CD-ROM and DVD copy protection technology that identies a
genuine CD-ROM or DVD using a special authentication mechanism. During
Sony DADCs mastering process an electronic ngerprint is applied onto the glass
master which assigns a unique number to each CD-ROM title.
29
The most recent version also detects if it is being run from a CD-R media
(V-Rally 2), to solve this just use a CD-ROM, instead of a CD-Writer, to play
the game from.
The latest SecuROM New revision includes Trigger Functions which allow the developer to program multiple and customizable authentication checks
throughout the entire application, providing a stronger copy control than systems
with only one check at program start [Gam03b].
Protection Classes: B, C, D
Backup Solution: First perform a raw data copy, then apply generic patches available on the
Internet
Vendor: Sony
Website: http://www.sony.com
SaveDisk v1-v3
SafeDisc v3 uses an key to encrypt the main executable (EXE or DLL) and
creates a corresponding digital signature which is added to the CD-ROM/DVDROM when they are replicated. The size of the digital signature varies from 3
to 20 MB depending how good the encryption should be. The authentication
process itself takes about 10 to 20 seconds [Gam03b].
Protection Classes: B, D
Backup Solution: First perform a raw data copy, then apply generic patches available on the
Internet (v1, v2) or patch the executable individually (v3).
Vendor: Macrovision Corporation
Website: http://www.macrovision.com
TAGES
TAGES uses new encryption and authentication technologies compatible with
standard multi-media PC computers and drives (a ring of 1 MB secured content)
[Gam03b].
Protection Classes: B, D
Backup Solution: Replacing the protected executable by a xed executable.
Vendor: MPO & THALES
Website: http://www.thalesgroup.com
List of Figures
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
2
12
16
16
19
Bibliography
[CDF03]
[Cod01]
[dJ03]
[Ent00]
PDF, 2000.
[Gam03a] GameCopyWorld.
Cd-cops copy.
Internet Website, 2003.
http://www.cdmediaworld.com/hardware/cdrom/cd protections cdcops.shtml.
[Gam03b] GameCopyWorld. Listing of copy protections. Internet Website, 2003.
http://www.cdmediaworld.com/hardware/cdrom/cd protections.shtml.
[Gra03]
[Hex03]
Hexalock.
Hexalock cd-rw.
http://www.hexalock.com/cd-rx.html.
[Mac01]
[Ser02a]
[Ser02b]
[Son02]
Sony.
Key2audio homepage.
http://www.key2audio.com/.
Internet
Internet
Website,
Website,
2003.
2002.
32
Bibliography
[Son03]
Sony.
Sony securom.
Internet
http://www.securom.com/solution disc.asp.
Website,
[Sto00]
Search Storage.
Compact disc.
Internet Website, 2000.
http://searchstorage.techtarget.com/sDenition/0,,sid5 gci507072,00.html.
2003.