{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T08:35:51Z","timestamp":1777106151737,"version":"3.51.4"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/spw54247.2022.9833867","type":"proceedings-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:14:47Z","timestamp":1658780087000},"page":"277-288","source":"Crossref","is-referenced-by-count":14,"title":["Exploring Widevine for Fun and Profit"],"prefix":"10.1109","author":[{"given":"Gwendal","family":"Patat","sequence":"first","affiliation":[{"name":"Univ Rennes,IRISA, CNRS,Rennes,France"}]},{"given":"Mohamed","family":"Sabt","sequence":"additional","affiliation":[{"name":"Univ Rennes,IRISA, CNRS,Rennes,France"}]},{"given":"Pierre-Alain","family":"Fouque","sequence":"additional","affiliation":[{"name":"Univ Rennes,IRISA, CNRS,Rennes,France"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Factory Images for Nexus and Pixel Devices","year":"0"},{"key":"ref11","article-title":"Ghidra SRE","year":"0"},{"key":"ref12","article-title":"Radare2","year":"0"},{"key":"ref13","article-title":"Frida","author":"ravn\u00e5s","year":"0"},{"key":"ref14","article-title":"Widevine DRM","year":"0"},{"key":"ref15","first-page":"655","article-title":"Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage","author":"garman","year":"2016","journal-title":"USENIX Security Symposium"},{"key":"ref16","article-title":"Protect against security threats with SafetyNet","year":"2022"},{"key":"ref17","article-title":"Netflix surpasses 200 million subscribers, but has more competition than ever in 2021","year":"2022"},{"key":"ref18","article-title":"Encrypted Media Extensions","year":"2022"},{"key":"ref19","article-title":"Eme Call and Event Logger","year":"2022"},{"key":"ref4","article-title":"Common encryption in ISO Base Media File Format files -2nd Edition","year":"2015"},{"key":"ref3","article-title":"Widevine","author":"widevine","year":"0"},{"key":"ref6","article-title":"Reported Case List","year":"2017"},{"key":"ref5","article-title":"Security warning draws DMCA threat","author":"mccullagh","year":"2002"},{"key":"ref8","article-title":"Over The Top services market to reach USD 139.00 billion in 2028; emergence of Smart TVs by various companies to bolster growth","year":"2022"},{"key":"ref7","article-title":"CVE List","year":"2022"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/978-3-319-71501-8_2","article-title":"The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions","volume":"10662","author":"halpin","year":"2017","journal-title":"SPC Ser Lecture Notes in Computer Science"},{"key":"ref1","article-title":"Encrypted Media Extensions","author":"dorwin","year":"2019"},{"key":"ref9","article-title":"QSEE privilege escalation vulnerability and exploit (CVE-2015-6639)","author":"beniamini","year":"2016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.149-172"},{"key":"ref22","article-title":"Breaking Widevine L3 on Linux Chrome browser","author":"buchanan","year":"2019"},{"key":"ref21","first-page":"133","article-title":"ARIstoteles - Dissecting Apple&#x2019;s Baseband Interface","volume":"12972","author":"kr\u00f6ll","year":"0"},{"key":"ref24","article-title":"Wideshears: Investigating and breaking widevine on QTEE","author":"zhao","year":"2021","journal-title":"BlackHat Asia"},{"key":"ref23","article-title":"DMCA","year":"2020"}],"event":{"name":"2022 IEEE Security and Privacy Workshops (SPW)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833855\/9833856\/09833867.pdf?arnumber=9833867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T20:02:41Z","timestamp":1660593761000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833867\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/spw54247.2022.9833867","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}