||This article needs attention from an expert in Blu-ray or Cryptography. (January 2009)|
BD+ is a component of the Blu-ray Disc Digital Rights Management system. It was developed by Cryptography Research Inc. and is based on their Self-Protecting Digital Content concept. Its intent was to prevent unauthorized copies of Blu-ray discs and the playback of Blu-ray media using unauthorized devices.
While BD+ has not stemmed the flow of "cracked" high definition content, it has made it necessary for those who wish to copy Blu-ray movies to reinvest resources to break each new version of security code.
BD+ played a pivotal role in the format war of Blu-ray and HD DVD. Several studios cited Blu-ray Disc's adoption of the BD+ anti-copying system as the reason they supported Blu-ray Disc over HD DVD. The copy protection scheme was to take "10 years" to crack, according to Richard Doherty, an analyst with Envisioneering Group.
||This section may be in need of reorganization to comply with Wikipedia's layout guidelines. (January 2009) (Learn how and when to remove this template message)|
- examine the host environment, to see if the player has been tampered with. Every licensed playback device manufacturer must provide the BD+ licensing authority with memory footprints that identify their devices.
- verify that the player's keys have not been changed.
- execute native code, possibly to patch an otherwise insecure system.
- transform the audio and video output. Parts of the content will not be viewable without letting the BD+-program repair it.
If a playback device manufacturer finds that its devices have been hacked, it can potentially release BD+-code that detects and circumvents the vulnerability. These programs can then be included in all new disc releases.
The specifications of the BD+ virtual machine are only officially available to licensed device manufacturers. A list of licensed adopters is available from the BD+ website. Both SlySoft (now RedFox) and members of the Doom9 forum have reverse engineered the virtual machine specification, however.
According to the reverse-engineered specification, the virtual machine consists of a 32-bit big endian DLX like processor with 4MB of RAM. It has 32 32-bit registers available for use. A TRAP instruction is used to allow the virtual machine host to perform more complex actions as system calls.
To prevent simple, static disassembly of the BD+ code, an instruction filter is available that can perform an XOR operation on an opcode before executing it. By varying the instruction filter at runtime, the compiler can force an adversary to trace through the code at runtime before they can fully disassemble it.
This program which can be found inside the BDSVM directory of a BD+ protected disc is called content code. The content code is executed on a virtual big endian DLX-like processor interfacing 4MB of memory. The processor supports 59 different instructions and a register set consisting of 32 general purpose registers and three special purpose registers for the instruction ﬁlter, the clock cycle counter and the program counter. The BD+ Virtual Machine applies memory protection by masking memory access addresses to prevent them from falling outside of the designated memory areas. The execution of content code starts at address 0x1000 relative to the beginning of the payload of the ﬁrst block of the ﬁle 00001.svm (located inside the BDSVM directory).
While the BD+ virtual machine is extremely simple, the interface between the virtual machine and the player is somewhat more complicated. BD+ provides the content code with 25 system calls or "traps". An overview is given in the table below. Note that the bits 00–07 of the trap id uniquely identify each trap within a group. The group id itself is speciﬁed by the bits 08–16 of the trap id. The group ids seen so far are 00 (event handling), 01 (cryptography operations), 02 (arithmetic operations), 03 (memory operations), 04 (slot memory access), 05 (device access) and 80 (debugging).
|Group ID||Trap ID||Name||Parameters|
Each of these system calls can be invoked by the TRAP instruction (opcode 0x39). By convention register 29 is used as the stack pointer holding the memory address of the parameters. After parameter validation the system call is executed and a return code is written to register 1. During its execution the content code performs a series of tests to verify it is being executed in a trusted environment. One of these tests involves asking the player for its certificate with
TRAP_Discovery. The RSA signature of this certificate is later verified by the content code using the public key of the license administration which is (optionally in obfuscated form) also stored in the content code. Later the player is asked to sign a random message with ECDSA by calling
TRAP_PrivateKey. The generated signature is subsequently verified using the player's public key stored in the previously verified certificate.
The BD+ virtual machine is event-driven. Five callbacks (events) are defined by the interface which the player may invoke to notify the content code of a variety of events, including the playback of various parts of the movie, shutdown, media eject events, or player security operations. The event data is exchanged using a dedicated memory area (0x00–0x3F).
TRAP_Finished is invoked whenever the content code has finished processing an event. The first event invoked is
EVENT_Startup which starts the execution of the content code.
|Group ID||Event ID||Name||Parameters|
Before a BD+-capable disc is mastered, random sections of the .m2ts files are overwritten by random data, effectively corrupting parts of the content. The original data is stored encrypted and obfuscated within the BD+ content code. After the content code has verified the security of the execution environment, it sends a table with repair instructions (the "conversion table" or "fix-up table") to the player using the system call
TRAP_FixUpTableSend. The conversion table consists of one subtable for each .m2ts file on the disc. A subtable consists of multiple, possibly empty, segments which contain the repair descriptors. Each repair descriptor then provides the raw data and the offset needed to repair a small section of a .m2ts file, replacing the corrupted part of the file with the original data.
Reverse engineering and emulation of BD+ implementations
On November 8, 2007, SlySoft announced that BD+ discs can be copied with their AnyDVD HD software. This was possible because first generation BD+ titles did not check if AACS was present. This allowed a user to copy a BD to the harddrive and play it back from there using only a specific version of Cyberlink's PowerDVD (3319a), but not to transcode, otherwise manipulate the content or play it back from a burned BD-R or BD-RE. Updated versions of BD+ security code plugged this hole.
On January 9, 2008, engadgethd.com reported that Fox has stated that BD+ has yet to be compromised. When asked how hi-def 20th Century Fox titles had become available online, the rep reported that the titles were available as HD DVDs in Europe.
In May 2008 the Blu-ray release of Jumper introduced a modified version of BD+ security code which prevented the Slysoft AnyDVD HD software from removing BD+. This modified version was again circumvented by Slysoft several months after Jumper was initially released.
In August 2008, members of the Doom9 forum began work on an independent project to create an open-source implementation of BD+.
In late October 2008, the same Doom9 members made the first working repaired BD+ movie with the previously developed open source tools, and as of November 1, 2008, have created code to debug content produced for BD+'s virtual machine.
On November 2, 2008, Doom9 forums announced that early (pre-May 2008) BD+ discs can be played back using open source software only.
In early November 2008 multiple versions of BD+ security code were released which, according to Slysoft, may take a few months to circumvent.
On December 29, 2008 Slysoft announced that AnyDVD HD 220.127.116.11 decrypts copy protection on all current Blu-ray movies.
On February 13, 2009 a 4th version of BD+ security code was discovered on the movie Australia, rendering Slysoft's existing AnyDVD HD software ineffective.
On March 19, 2009 Slysoft announced that AnyDVD HD 18.104.22.168 adds support for some new BD+ protection in movies, e.g. Australia, The Robe, South Pacific. Some BD+ movies were not supported by Slysoft's update, e.g. Slumdog Millionaire, The Day the Earth Stood Still, Marley & Me, X-Men Trilogy. Since then, Slysoft has released several updates adding support for newer titles.
On October 7, 2009 support for BD+ was announced for MakeMKV, making it the second application capable of handling all BD+ discs released to date.
In 2010 four other companies released software that can decrypt BD+; DVD Fab. Blu-ray Copy, Pavtube Blu-ray Copy, and BlindWrite.
- "About SPDC". Cryptography Research, Inc. Archived from the original on 1 April 2009. Retrieved 2009-04-12.
- BD+ re-secured, Slysoft beaten
- Ryan Singel (February 26, 2008). "How Crypto Won the DVD War". Wired. Archived from the original on 1 March 2008. Retrieved 2008-02-27.
- "Macrovision to Acquire Blu-ray Disc Security Technology from Cryptography Research, Inc.". Archived from the original on 2007-11-21.
- "Irdeto fights piracy with BD+ technology". OnScreen Asia. 11 July 2011. Archived from the original on 25 October 2011. Retrieved 3 October 2011.
- Rosenblatt, Bill (7 July 2011). "Irdeto Acquires BD+ Technology from Rovi". Copyright and Technology. Retrieved 9 November 2011.
- "Blu-ray Disc Next-Generation Optical Storage: Protecting Content on the BD-ROM" (PDF). DELL. Archived (PDF) from the original on 31 March 2007. Retrieved 2007-05-03.
- US application 2010169663, "Systems and Methods for Detecting Authorized Players", published 2010-07-01, assigned to CYBERLINK CORPORATION
- BD+ Technologies LLC
- Doom9 thread on reverse engineering
- Doom9 thread on instruction filter
- AnyDVD 22.214.171.124 beta - SlySoft Forum
- BD+ has not been compromised, yet, Engadget HD.
- Press Release: AnyDVD HD now with BD+ support - SlySoft Forum
- AnyDVD 126.96.36.199 - SlySoft Forum
- ZDNet Blogs
- Press Release: AnyDVD HD now with BD+ support - SlySoft Forum
- Finally handling BD+ - Doom9 Forum
-  Finally handling BD+ - Doom9 Forum
- Dawson, K (2008-11-01). "Doom9 Researchers Break BD+". Slashdot. Archived from the original on 7 December 2008. Retrieved 2008-11-02.
- Doom9 forums announced that BD+ disc can be copied
- BD+ movies that Anydvd HD 188.8.131.52 beta may not handle properly
- SlySoft defeats Blu-ray's BD+ DRM scheme again
- BD+ discs that may not work properly with Anydvd HD
- AnyDVD (HD) 184.108.40.206 released
- More BD+ discs that may not work properly with Anydvd HD
- BD+ status page
- "libbdplus". VideoLAN. 2013-12-18. Retrieved 2013-12-25.