{"id":"https://openalex.org/W4280590753","doi":"https://doi.org/10.1109/spw54247.2022.9833867","title":"Exploring Widevine for Fun and Profit","display_name":"Exploring Widevine for Fun and Profit","publication_year":2022,"publication_date":"2022-05-01","ids":{"openalex":"https://openalex.org/W4280590753","doi":"https://doi.org/10.1109/spw54247.2022.9833867"},"language":"en","primary_location":{"id":"doi:10.1109/spw54247.2022.9833867","is_oa":false,"landing_page_url":"https://doi.org/10.1109/spw54247.2022.9833867","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Security and Privacy Workshops (SPW)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061207240","display_name":"Gwendal Patat","orcid":null},"institutions":[{"id":"https://openalex.org/I2802519937","display_name":"Institut de Recherche en Informatique et Syst\u00e8mes Al\u00e9atoires","ror":"https://ror.org/00myn0z94","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I205703379","https://openalex.org/I2802204017","https://openalex.org/I2802519937","https://openalex.org/I28221208","https://openalex.org/I4210127572","https://openalex.org/I4210159245","https://openalex.org/I56067802"]},{"id":"https://openalex.org/I56067802","display_name":"Universit\u00e9 de Rennes","ror":"https://ror.org/015m7wh34","country_code":"FR","type":"education","lineage":["https://openalex.org/I56067802"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Gwendal Patat","raw_affiliation_strings":["Univ Rennes,IRISA, CNRS,Rennes,France","IRISA, CNRS, Univ Rennes, Rennes, France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Univ Rennes,IRISA, CNRS,Rennes,France","institution_ids":["https://openalex.org/I56067802","https://openalex.org/I2802519937","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"IRISA, CNRS, Univ Rennes, Rennes, France","institution_ids":["https://openalex.org/I56067802","https://openalex.org/I2802519937","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047988273","display_name":"Mohamed Sabt","orcid":null},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I2802519937","display_name":"Institut de Recherche en Informatique et Syst\u00e8mes Al\u00e9atoires","ror":"https://ror.org/00myn0z94","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I205703379","https://openalex.org/I2802204017","https://openalex.org/I2802519937","https://openalex.org/I28221208","https://openalex.org/I4210127572","https://openalex.org/I4210159245","https://openalex.org/I56067802"]},{"id":"https://openalex.org/I56067802","display_name":"Universit\u00e9 de Rennes","ror":"https://ror.org/015m7wh34","country_code":"FR","type":"education","lineage":["https://openalex.org/I56067802"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Mohamed Sabt","raw_affiliation_strings":["Univ Rennes,IRISA, CNRS,Rennes,France","IRISA, CNRS, Univ Rennes, Rennes, France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Univ Rennes,IRISA, CNRS,Rennes,France","institution_ids":["https://openalex.org/I56067802","https://openalex.org/I2802519937","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"IRISA, CNRS, Univ Rennes, Rennes, France","institution_ids":["https://openalex.org/I56067802","https://openalex.org/I2802519937","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016755346","display_name":"Pierre-Alain Fouque","orcid":"https://orcid.org/0000-0003-4997-2276"},"institutions":[{"id":"https://openalex.org/I56067802","display_name":"Universit\u00e9 de Rennes","ror":"https://ror.org/015m7wh34","country_code":"FR","type":"education","lineage":["https://openalex.org/I56067802"]},{"id":"https://openalex.org/I2802519937","display_name":"Institut de Recherche en Informatique et Syst\u00e8mes Al\u00e9atoires","ror":"https://ror.org/00myn0z94","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I205703379","https://openalex.org/I2802204017","https://openalex.org/I2802519937","https://openalex.org/I28221208","https://openalex.org/I4210127572","https://openalex.org/I4210159245","https://openalex.org/I56067802"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Pierre-Alain Fouque","raw_affiliation_strings":["Univ Rennes,IRISA, CNRS,Rennes,France","IRISA, CNRS, Univ Rennes, Rennes, France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Univ Rennes,IRISA, CNRS,Rennes,France","institution_ids":["https://openalex.org/I56067802","https://openalex.org/I2802519937","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"IRISA, CNRS, Univ Rennes, Rennes, France","institution_ids":["https://openalex.org/I56067802","https://openalex.org/I2802519937","https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061207240"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I2802519937","https://openalex.org/I56067802"],"apc_list":null,"apc_paid":null,"fwci":1.2245,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.79946656,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"277","last_page":"288"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7895569801330566},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6753028631210327},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5686368942260742},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5454013347625732},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5117032527923584},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5062743425369263},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.4853498041629791},{"id":"https://openalex.org/keywords/digital-content","display_name":"Digital content","score":0.481076717376709},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.44967252016067505},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.44142845273017883},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.42474472522735596},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.40868139266967773},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.39640378952026367},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.24309051036834717},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17877310514450073}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7895569801330566},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6753028631210327},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5686368942260742},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5454013347625732},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5117032527923584},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5062743425369263},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.4853498041629791},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.481076717376709},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.44967252016067505},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.44142845273017883},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.42474472522735596},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.40868139266967773},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.39640378952026367},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.24309051036834717},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17877310514450073},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/spw54247.2022.9833867","is_oa":false,"landing_page_url":"https://doi.org/10.1109/spw54247.2022.9833867","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Security and Privacy Workshops (SPW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2506049781","https://openalex.org/W2769044717","https://openalex.org/W3203120992","https://openalex.org/W6724779768"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W2132360941","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W2024170198","https://openalex.org/W2152144666","https://openalex.org/W1819617256","https://openalex.org/W2596984206","https://openalex.org/W1507511632"],"abstract_inverted_index":{"For":[0],"years,":[1],"Digital":[2],"Right":[3],"Management":[4],"(DRM)":[5],"systems":[6],"have":[7,36],"been":[8,37],"used":[9],"as":[10,30,43,105,144],"the":[11,21,53,57,161],"go-to":[12],"solution":[13],"for":[14,133],"media":[15],"content":[16,25,96],"protection":[17],"against":[18],"piracy.":[19],"With":[20],"growing":[22],"consumption":[23],"of":[24,63,78,103,142,163],"using":[26],"Over-the-Top":[27],"platforms,":[28],"such":[29],"Netflix":[31,140],"or":[32],"Prime":[33],"Video,":[34],"DRMs":[35],"deployed":[38],"on":[39,52,61,67,81,114,123,151],"numerous":[40],"devices":[41],"considered":[42],"potential":[44],"hostile":[45],"environments.":[46],"In":[47,153],"this":[48,136],"paper,":[49],"we":[50,117,138,155],"focus":[51],"most":[54],"widespread":[55],"solution,":[56],"closed-source":[58],"Widevine":[59,65,79,104,127,143,165],"DRM.Installed":[60],"billions":[62],"devices,":[64],"relies":[66],"crypto-graphic":[68],"operations":[69],"to":[70,125,159],"protect":[71],"content.":[72],"Our":[73],"work":[74],"presents":[75],"a":[76,100,106,120,145],"study":[77],"internals":[80],"Android,":[82],"mapping":[83],"its":[84,90,109,172],"distinct":[85],"components":[86],"and":[87,130,147,170],"bringing":[88],"out":[89],"different":[91],"cryptographic":[92],"keys":[93],"involved":[94],"in":[95],"decryption.":[97],"We":[98],"provide":[99],"structural":[101],"view":[102],"protocol":[107],"with":[108],"complete":[110],"key":[111],"ladder.":[112],"Based":[113],"our":[115,157],"insights,":[116],"develop":[118],"WideXtractor,":[119],"tool":[121],"based":[122],"Frida":[124],"trace":[126],"function":[128],"calls":[129],"intercept":[131],"messages":[132],"inspection.":[134],"Using":[135],"tool,":[137],"analyze":[139],"usage":[141],"proof-of-concept,":[146],"raised":[148],"privacy":[149],"concerns":[150],"user-tracking.":[152],"addition,":[154],"leverage":[156],"knowledge":[158],"bypass":[160],"obfuscation":[162],"Android":[164],"software-only":[166],"version,":[167],"namely":[168],"L3,":[169],"recover":[171],"Root-of-Trust.":[173]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":3}],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2025-10-10T00:00:00"}
