以打印机墨盒为例,实现硬件DRM保护的方法和操作

IF 0.2 Q4 ENGINEERING, GEOLOGICAL
Wojciech Cybowski
{"title":"以打印机墨盒为例,实现硬件DRM保护的方法和操作","authors":"Wojciech Cybowski","doi":"10.31648/ts.7634","DOIUrl":null,"url":null,"abstract":"The subject of this paper is to analyze the way of implementation and operation of hardware DRM protection systems on the example of selected printer cartridges. Thanks to the analysis, it is possible to understand the way of operation of typical security chips used in printer cartridges. Using the knowledge gained, it becomes possible to modify the data on the security chips and thus reset the protection, so that the printer sees the chip with the modified data as a new one. However, the process itself was difficult due to the lack of publicly available materials on this topic. In this paper, different approaches to DRM security analysis have been used, so that the reader can try to perform the described steps to analyze other hardware DRM systems by himself. In addition, devices called resetters have been designed and fabricated to quickly reset the analyzed security chips. Their design and documentation is available on the author's Github.","PeriodicalId":41669,"journal":{"name":"Archives for Technical Sciences","volume":null,"pages":null},"PeriodicalIF":0.2000,"publicationDate":"2022-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Methods of implementation and operation of hardware DRM protection on the example of printer cartridges\",\"authors\":\"Wojciech Cybowski\",\"doi\":\"10.31648/ts.7634\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The subject of this paper is to analyze the way of implementation and operation of hardware DRM protection systems on the example of selected printer cartridges. Thanks to the analysis, it is possible to understand the way of operation of typical security chips used in printer cartridges. Using the knowledge gained, it becomes possible to modify the data on the security chips and thus reset the protection, so that the printer sees the chip with the modified data as a new one. However, the process itself was difficult due to the lack of publicly available materials on this topic. In this paper, different approaches to DRM security analysis have been used, so that the reader can try to perform the described steps to analyze other hardware DRM systems by himself. In addition, devices called resetters have been designed and fabricated to quickly reset the analyzed security chips. Their design and documentation is available on the author's Github.\",\"PeriodicalId\":41669,\"journal\":{\"name\":\"Archives for Technical Sciences\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.2000,\"publicationDate\":\"2022-09-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Archives for Technical Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31648/ts.7634\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, GEOLOGICAL\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Archives for Technical Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31648/ts.7634","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, GEOLOGICAL","Score":null,"Total":0}
引用次数: 0

摘要

本文以选定的打印机墨盒为例,分析硬件DRM保护系统的实现方式和运行方式。通过分析,可以了解打印机墨盒中使用的典型安全芯片的操作方式。利用所获得的知识,可以修改安全芯片上的数据,从而重置保护,使打印机将修改数据的芯片视为新的芯片。然而,由于缺乏关于这一主题的公开材料,这一过程本身就很困难。本文使用了不同的DRM安全性分析方法,以便读者可以尝试自己执行所描述的步骤来分析其他硬件DRM系统。此外,已经设计和制造了称为复位器的设备,以快速复位分析的安全芯片。他们的设计和文档可以在作者的Github上找到。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Methods of implementation and operation of hardware DRM protection on the example of printer cartridges
The subject of this paper is to analyze the way of implementation and operation of hardware DRM protection systems on the example of selected printer cartridges. Thanks to the analysis, it is possible to understand the way of operation of typical security chips used in printer cartridges. Using the knowledge gained, it becomes possible to modify the data on the security chips and thus reset the protection, so that the printer sees the chip with the modified data as a new one. However, the process itself was difficult due to the lack of publicly available materials on this topic. In this paper, different approaches to DRM security analysis have been used, so that the reader can try to perform the described steps to analyze other hardware DRM systems by himself. In addition, devices called resetters have been designed and fabricated to quickly reset the analyzed security chips. Their design and documentation is available on the author's Github.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Archives for Technical Sciences
Archives for Technical Sciences ENGINEERING, GEOLOGICAL-
自引率
0.00%
发文量
10
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信