{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:50Z","timestamp":1750306550912,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,16]],"date-time":"2015-10-16T00:00:00Z","timestamp":1444953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,16]]},"DOI":"10.1145\/2808414.2808416","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"43-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Content Protection in HTML5 TV Platforms"],"prefix":"10.1145","author":[{"given":"Alexandra","family":"Mikityuk","sequence":"first","affiliation":[{"name":"Security in Telecommunications Technical University of Berlin, Berlin, Germany"}]},{"given":"Stefan","family":"Pham","sequence":"additional","affiliation":[{"name":"Fraunhofer FOKUS, Berlin, Germany"}]},{"given":"Stefan","family":"Kaiser","sequence":"additional","affiliation":[{"name":"Zattoo, Berlin, Germany"}]},{"given":"Oliver","family":"Friedrich","sequence":"additional","affiliation":[{"name":"Telekom Innovation Laboratories, Berlin, Germany"}]},{"given":"Stefan","family":"Arbanowski","sequence":"additional","affiliation":[{"name":"Fraunhofer FOKUS, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2015,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Adrian Bateman and Mark Watson. W3C Editor","author":"Colwell Aaron","year":"2012","unstructured":"Aaron Colwell , Adrian Bateman and Mark Watson. W3C Editor 's Draft. HTML5. A vocabulary and associated APIs for HTML and XHTML. , 2012 . Aaron Colwell, Adrian Bateman and Mark Watson. W3C Editor's Draft. HTML5. A vocabulary and associated APIs for HTML and XHTML., 2012."},{"key":"e_1_3_2_1_2_1","volume-title":"Adrian Bateman and Mark Watson. W3C Editor","author":"Colwell Aaron","year":"2014","unstructured":"Aaron Colwell , Adrian Bateman and Mark Watson. W3C Editor 's Draft - Media Source Extensions ., 2014 . Aaron Colwell, Adrian Bateman and Mark Watson. W3C Editor's Draft - Media Source Extensions., 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"http:\/\/www.activevideo.com\/","author":"Networks Active Video","year":"2015","unstructured":"Active Video Networks . http:\/\/www.activevideo.com\/ , 2015 . Active Video Networks. http:\/\/www.activevideo.com\/, 2015."},{"key":"e_1_3_2_1_4_1","volume-title":"http:\/\/www.activevideo.com\/case-studies","author":"Networks Case Studies Active Video","year":"2015","unstructured":"Active Video Networks Case Studies . http:\/\/www.activevideo.com\/case-studies , 2015 . Active Video Networks Case Studies. http:\/\/www.activevideo.com\/case-studies, 2015."},{"key":"e_1_3_2_1_5_1","volume-title":"The stick gets smart","author":"Pennington Adrian","year":"2014","unstructured":"Adrian Pennington . The stick gets smart , 2014 . Adrian Pennington. The stick gets smart, 2014."},{"key":"e_1_3_2_1_6_1","unstructured":"ARM. Trustzone. http:\/\/www.arm.com\/products\/processors\/technologies\/trustzone\/index.php.  ARM. Trustzone. http:\/\/www.arm.com\/products\/processors\/technologies\/trustzone\/index.php."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2010","author":"Barth A.","year":"2010","unstructured":"A. Barth , A. P. Felt , P. Saxena , and A. Boodman . Protecting browsers from extension vulnerabilities . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2010 , San Diego, California, USA, 28th February - 3rd March 2010 , 2010. A. Barth, A. P. Felt, P. Saxena, and A. Boodman. Protecting browsers from extension vulnerabilities. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA, 28th February - 3rd March 2010, 2010."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335484.2335518"},{"key":"e_1_3_2_1_9_1","volume-title":"Cable Congress http:\/\/cablecongress.com\/wp-content\/uploads\/cablecongress\/2014\/03\/Cheevers-Charles.pdf","author":"Cheevers Charles","year":"2014","unstructured":"Charles Cheevers , CTO Customer Premise Equipment Group in ARRIS. Changing the role of STB . Cable Congress http:\/\/cablecongress.com\/wp-content\/uploads\/cablecongress\/2014\/03\/Cheevers-Charles.pdf , 2014 . Charles Cheevers, CTO Customer Premise Equipment Group in ARRIS. Changing the role of STB. Cable Congress http:\/\/cablecongress.com\/wp-content\/uploads\/cablecongress\/2014\/03\/Cheevers-Charles.pdf, 2014."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2014.100"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp:19960795"},{"key":"e_1_3_2_1_13_1","volume-title":"Adrian Bateman and Mark Watson. W3C Editor","author":"Dorwin David","year":"2014","unstructured":"David Dorwin , Adrian Bateman and Mark Watson. W3C Editor 's Draft - Encrypted Media Extensions ., 2014 . David Dorwin, Adrian Bateman and Mark Watson. W3C Editor's Draft - Encrypted Media Extensions., 2014."},{"key":"e_1_3_2_1_14_1","volume-title":"A first look at firefox OS security. CoRR, abs\/1410.7754","author":"Defreez D.","year":"2014","unstructured":"D. Defreez , B. Shastry , H. Chen , and J. Seifert . A first look at firefox OS security. CoRR, abs\/1410.7754 , 2014 . D. Defreez, B. Shastry, H. Chen, and J. Seifert. A first look at firefox OS security. CoRR, abs\/1410.7754, 2014."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2011.5722554"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2010.5418687"},{"key":"e_1_3_2_1_17_1","volume-title":"Our strategy for STB-less IPTV. IPTV Seminar http:\/\/iptvseminar.com\/documents\/2014\/11\/oliver-friedrich-deutsche-telekom-stb-less-standard.pdf","author":"Oliver Friedrich Dr.","year":"2014","unstructured":"Dr. Oliver Friedrich . Our strategy for STB-less IPTV. IPTV Seminar http:\/\/iptvseminar.com\/documents\/2014\/11\/oliver-friedrich-deutsche-telekom-stb-less-standard.pdf , 2014 . Dr. Oliver Friedrich. Our strategy for STB-less IPTV. IPTV Seminar http:\/\/iptvseminar.com\/documents\/2014\/11\/oliver-friedrich-deutsche-telekom-stb-less-standard.pdf, 2014."},{"key":"e_1_3_2_1_18_1","first-page":"2014","author":"EUROMEDIA","year":"2014","unstructured":"EUROMEDIA Magazine. STB and Home Gateway Survey. http:\/\/irdeto.com\/documents\/Articles\/art_euromedia-magazine_JulAug_ 2014 .pdf, 2014 . EUROMEDIA Magazine. STB and Home Gateway Survey. http:\/\/irdeto.com\/documents\/Articles\/art_euromedia-magazine_JulAug_2014.pdf, 2014.","journal-title":"Magazine. STB and Home Gateway Survey. http:\/\/irdeto.com\/documents\/Articles\/art_euromedia-magazine_JulAug_"},{"key":"e_1_3_2_1_19_1","volume-title":"Oct. 5","author":"Evans G.","year":"2010","unstructured":"G. Evans and J. Bradstreet . Secure media path methods, systems, and architectures , Oct. 5 2010 . US Patent 7,810,163. G. Evans and J. Bradstreet. Secure media path methods, systems, and architectures, Oct. 5 2010. US Patent 7,810,163."},{"key":"e_1_3_2_1_20_1","volume-title":"Open source CDM implementation. https:\/\/github.com\/fraunhoferfokus\/open-content-decryption-module","author":"Fokus Fraunhofer","year":"2014","unstructured":"Fraunhofer Fokus . Open source CDM implementation. https:\/\/github.com\/fraunhoferfokus\/open-content-decryption-module , 2014 . Fraunhofer Fokus. Open source CDM implementation. https:\/\/github.com\/fraunhoferfokus\/open-content-decryption-module, 2014."},{"key":"e_1_3_2_1_21_1","volume-title":"Open source CDMi implementation. https:\/\/github.com\/fraunhoferfokus\/open-content-decryption-module-cdmi","author":"Fokus Fraunhofer","year":"2014","unstructured":"Fraunhofer Fokus . Open source CDMi implementation. https:\/\/github.com\/fraunhoferfokus\/open-content-decryption-module-cdmi , 2014 . Fraunhofer Fokus. Open source CDMi implementation. https:\/\/github.com\/fraunhoferfokus\/open-content-decryption-module-cdmi, 2014."},{"key":"e_1_3_2_1_22_1","unstructured":"A. Gal. Reconciling Mozilla's Mission and W3C EME. https:\/\/hacks.mozilla.org\/2014\/05\/reconciling-mozillas-mission-and-w3c-eme\/.  A. Gal. Reconciling Mozilla's Mission and W3C EME. https:\/\/hacks.mozilla.org\/2014\/05\/reconciling-mozillas-mission-and-w3c-eme\/."},{"key":"e_1_3_2_1_23_1","unstructured":"Google. Pepper Plugin API. https:\/\/code.google.com\/p\/ppapi\/.  Google. Pepper Plugin API. https:\/\/code.google.com\/p\/ppapi\/."},{"key":"e_1_3_2_1_24_1","volume-title":"Information technology -- MPEG systems technologies -- Part 7: Common encryption in ISO base media file format files","author":"IEC","year":"2012","unstructured":"ISO\/ IEC 23001--7:2012. Information technology -- MPEG systems technologies -- Part 7: Common encryption in ISO base media file format files , 2012 . ISO\/IEC 23001--7:2012. Information technology -- MPEG systems technologies -- Part 7: Common encryption in ISO base media file format files, 2012."},{"key":"e_1_3_2_1_25_1","volume-title":"Information technology - Dynamic adaptive streaming over HTTP (DASH) - Part 1: Media presentation description and segment formats","author":"IEC","year":"2012","unstructured":"ISO\/ IEC 23009--1:2012. Information technology - Dynamic adaptive streaming over HTTP (DASH) - Part 1: Media presentation description and segment formats , 2012 . ISO\/IEC 23009--1:2012. Information technology - Dynamic adaptive streaming over HTTP (DASH) - Part 1: Media presentation description and segment formats, 2012."},{"key":"e_1_3_2_1_26_1","volume-title":"Content Decryption Module Interface Specification. Version 1.0","author":"Simmons Jahn C.","year":"2014","unstructured":"Jahn C. Simmons . Content Decryption Module Interface Specification. Version 1.0 , 2014 . Jahn C. Simmons. Content Decryption Module Interface Specification. Version 1.0, 2014."},{"key":"e_1_3_2_1_27_1","volume-title":"Mar. 25","author":"Jenkin G.","year":"2014","unstructured":"G. Jenkin , M. Liassides , J. Gilmour , C. Hooks , and D. Evans . Virtual set-top box that executes service provider middleware , Mar. 25 2014 . US Patent 8,683,543. G. Jenkin, M. Liassides, J. Gilmour, C. Hooks, and D. Evans. Virtual set-top box that executes service provider middleware, Mar. 25 2014. US Patent 8,683,543."},{"key":"e_1_3_2_1_28_1","volume-title":"DIGITAL RIGHTS MANAGEMENT AND THE WEB","author":"Simmons John C.","year":"2013","unstructured":"John C. Simmons , Dr. Stefan Arbanowski . INTEROPERABILITY , DIGITAL RIGHTS MANAGEMENT AND THE WEB , 2013 . John C. Simmons, Dr. Stefan Arbanowski. INTEROPERABILITY, DIGITAL RIGHTS MANAGEMENT AND THE WEB, 2013."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2011.5766480"},{"key":"e_1_3_2_1_30_1","unstructured":"Linaro. https:\/\/www.linaro.org\/.  Linaro. https:\/\/www.linaro.org\/."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers 2003 -","volume":"21","author":"Liu Q.","year":"2003","unstructured":"Q. Liu , R. Safavi-Naini , and N. P. Sheppard . Digital rights management for content distribution . In Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers 2003 - Volume 21 , ACSW Frontiers '03, pages 49--58, Darlinghurst, Australia, Australia , 2003 . Australian Computer Society, Inc. Q. Liu, R. Safavi-Naini, and N. P. Sheppard. Digital rights management for content distribution. In Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers 2003 - Volume 21, ACSW Frontiers '03, pages 49--58, Darlinghurst, Australia, Australia, 2003. Australian Computer Society, Inc."},{"key":"e_1_3_2_1_32_1","volume-title":"Apple TV vs Chromecast: Which is better? Comparison of the Google and Apple set-top boxes","author":"Swider Matt","year":"2013","unstructured":"Matt Swider . Apple TV vs Chromecast: Which is better? Comparison of the Google and Apple set-top boxes , 2013 . Matt Swider. Apple TV vs Chromecast: Which is better? Comparison of the Google and Apple set-top boxes, 2013."},{"key":"e_1_3_2_1_33_1","volume-title":"On the impact of TV Virtualization on Content Protection technologies","author":"Mikityuk A.","year":"2014","unstructured":"A. Mikityuk , O. Friedrich , and J. Barta . On the impact of TV Virtualization on Content Protection technologies , 2014 . A. Mikityuk, O. Friedrich, and J. Barta. On the impact of TV Virtualization on Content Protection technologies, 2014."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2013.6670887"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCChina.2014.7008270"},{"key":"e_1_3_2_1_36_1","volume-title":"OCAP","author":"Morris S.","year":"2005","unstructured":"S. Morris . Interactive TV standards: a guide to MHP , OCAP , and JavaTV. Elsevier , San Diego, CA , 2005 . S. Morris. Interactive TV standards: a guide to MHP, OCAP, and JavaTV. Elsevier, San Diego, CA, 2005."},{"volume-title":"MovieLabs Specification for Enhanced Content Protection -- Version(1.1)","year":"2015","key":"e_1_3_2_1_37_1","unstructured":"MovieLabs. MovieLabs Specification for Enhanced Content Protection -- Version(1.1) , 2015 . MovieLabs. MovieLabs Specification for Enhanced Content Protection -- Version(1.1), 2015."},{"key":"e_1_3_2_1_38_1","volume-title":"http:\/\/rdkcentral.com\/","author":"Kit Alliance Reference Design","year":"2015","unstructured":"Reference Design Kit Alliance . http:\/\/rdkcentral.com\/ , 2015 . Reference Design Kit Alliance. http:\/\/rdkcentral.com\/, 2015."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1538947.1556050"},{"volume-title":"http:\/\/www.appflinger.com\/","year":"2015","key":"e_1_3_2_1_40_1","unstructured":"TVersity. http:\/\/www.appflinger.com\/ , 2015 . TVersity. http:\/\/www.appflinger.com\/, 2015."},{"key":"e_1_3_2_1_41_1","volume-title":"ISO Common Encryption EME Stream Format and Initialization Data","author":"C.","year":"2015","unstructured":"W3 C. ISO Common Encryption EME Stream Format and Initialization Data , 2015 . W3C. ISO Common Encryption EME Stream Format and Initialization Data, 2015."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/APWeb.2010.43"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 5th International Workshop on Trustworthy Embedded Devices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808414.2808416","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808414.2808416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:41Z","timestamp":1750227161000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808414.2808416"}},"subtitle":["Towards Browser-agnostic DRM and Cloud UI Environments"],"short-title":[],"issued":{"date-parts":[[2015,10,16]]},"references-count":42,"alternative-id":["10.1145\/2808414.2808416","10.1145\/2808414"],"URL":"https:\/\/doi.org\/10.1145\/2808414.2808416","relation":{},"subject":[],"published":{"date-parts":[[2015,10,16]]},"assertion":[{"value":"2015-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}