Abstract
The satellite TV industry relies heavily on the use of smart card technology at the very heart of broadcasted services that are protected by legacy conditional access systems. The process of Satellite TV signal protection is distributed amongst a number of system components, e.g. smart cards, receivers, Conditional Access Modules (CAM) and the content provider. However, the introduction of “Open” Satellite Receivers, providing a highly configurable environment with software emulation of conditional access systems, enabled the implementation of whole range of new attacks. A widely deployed attack is often referred to as the “card sharing” attack, by which one legitimate user colludes to provide protected content to a larger group of unauthorised users. This paper proposes a countermeasure that increases the bandwidth requirements of this attack to the point where it is no longer practical with a standard internet connection, with a minimal impact on existing protocols and architectures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ETR 154: Digital video broadcasting (DVB): Implementation guidelines for the use of MPEG-2 systems; video and audio in satellite, cable and terrestrial broadcasting applications
Anonymous. CSA – known facts and speculations, http://CSA.irde.to
MultiMediaCard Association, http://www.mmca.org
MultiMediaCard Association. Application note, an0501-1.00 (April 2005), http://www.mmca.org/compliance/buy_spec/AN_MMCA050419.pdf
EBU Project Group B/CA. Functional model of a conditional access system. EBU technical Review, Winter (1995)
CENELEC. Common interface specification for conditional access and other digital video broadcasting decoder applications. Technical Report CENELEC Standard 50221, European Committee for Electrotechnical Standardization (CENELEC), Brussels, Belgium (February 1997)
Chachiere, V.: Man ordered to pay $180m restitution for TV signal piracy. Naples Daily News, http://www.naplesnews.com
Cryptoworks, http://www.digitalnetworks.philips.com
Cutts, D.J.: DVB conditional access. IEE Electronics and Communications Engineering Journal 9(1), 21–27 (1997)
Giesecke, Devrient: Secure and mobile storage media – the memory card with smart card technology (2005), http://www.gi-de.com/
ETSI. Digital video broadcasting (DVB); support for use of scrambling and conditional access (CA) within digital broadcasting systems. Technical Report ETSI Technical Report ETR 289, European Telecommunications Standards Institute (ETSI), Sophia Antipolis, France (October 1996)
Gemplus. Cryptomotion. In: Cartes 2003 (2003), review available at: http://www.prnewswire.co.uk/cgi/news/release?id=112260
Guillou, L.C.: Smart cards and conditional access. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 480–489. Springer, Heidelberg (1985)
helpwithpcs.com. Internet connections explained, a guide to dial-up, adsl and cable connections, http://www.helpwithpcs.com/internet/internet-connections.htm#adsl-connections
Hewitt, R.: North american MPEG-2 information (July 2003), http://www.coolstf.com/mpeg
Holankar, D., Stamp, M.: Secure streaming media and digital rights management. In: Proceedings of the 2004 Hawaii International Conference on Computer Science, pp. 85–96. ACM Press, New York (2004)
Irdeto, http://www.irdetoaccess.com
Kalina, P.: No-pay TV costs industry $50m. The Age Journal, http://www.theage.com.um
Kravitz, D.W., Goldschlag, D.M.: Conditional access concepts and principles. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol. 1648, pp. 158–172. Springer, Heidelberg (1999)
Kuhn, M.: Attack on pay-tv access control systems. Security Seminar talk, University of Cambridge, London (1997)
Langelaar, G.C.: Overview of protection methods in existing TV and storage devices. Technical University of Delft (July 1996)
McCormac, J.: European scrambling system. Waterford University Press (1996)
International Standards Organisation. ISO7816–3 smart card standard: Part 3: Electronic signals and transmission protocols
Praca, D.: Next generation smart card: New features, new architecture and system integration. In: 6th e-Smart Conference, Sophia Antipolis, France (September 2005)
Praca, D., Barral, C.: From smart cards to smart objects: The road to new smart card technologies. Computer networks 36(4), 381–389 (2001)
STmicroelectronics. Smartcard solutions ST19 multi-application smartcard ICs, http://www.st.com
STmicroelectronics. STmicroelectronics delivers world’s first USB-certified smart card chips (2002), http://www.st.com
VIAccess, http://www.viaccess.com
Dream Multimedia Worldwide. Dreambox DM7000s user manual, http://www.dream-multimedia-tv.de/manual/manual_eng.zip
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tunstall, M., Markantonakis, K., Mayes, K. (2006). Inhibiting Card Sharing Attacks. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S. (eds) Advances in Information and Computer Security. IWSEC 2006. Lecture Notes in Computer Science, vol 4266. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11908739_17
Download citation
DOI: https://doi.org/10.1007/11908739_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-47699-3
Online ISBN: 978-3-540-47700-6
eBook Packages: Computer ScienceComputer Science (R0)