Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/976440.976444dlproceedingsArticle/Chapter ViewAbstractPublication Pagesaus-cswConference Proceedingsconference-collections
Article
Free access

Tamper-proofing software watermarks

Published: 01 January 2004 Publication History
  • Get Citation Alerts
  • Abstract

    We introduce a novel method called constant encoding, which can be used to tamper-proof a software watermark that is embedded in the dynamic data structures of a program. Our novel tamper-proofing method is based on transforming numeric or non-numeric constant values in the text of the watermarked program into function calls whose value depends on the watermark data structure. Under reasonable assumptions about the knowledge and resources of an attacker, we argue that no attacker can be certain that they have altered our tamperproofed watermark unless they take a risk of affecting program correctness in some way that may be difficult to detect. In this paper we also present a novel scheme for representing a numeric value as a Planted Plane Cubic Tree, and we describe how to use this scheme in a particularly-effective implementation of our constant encoding tamperproofing method.

    References

    [1]
    Ball, T. & Larus, J. R. (1996), Efficient path profiling, in 'Proceedings of the 29th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-29)', pp. 46--57.
    [2]
    Collberg, C. & Thomborson, C. (1999), Software watermarking: Models and dynamic embeddings, in 'Principles of Programming Languages (POPL'99)', San Antonio, TX, pp. 311--324.
    [3]
    Collberg, C., Thomborson, C. & Low, D. (1998), Manufacturing cheap, resilient, and stealthy opaque constructs, in 'Principles of Programming Languages (POPL'98)', San Diego, CA, pp. 184--196.
    [4]
    He, Y. (2002), Tamperproofing a software watermark by encoding constants, Master's thesis, Comp. Sci. Dept., Univ. of Auckland.
    [5]
    Holmes, K. (1994), 'Computer software protection', US Patent 5,287,407. Assignee: International Business Machines.
    [6]
    Kreher, D. & Stinson, D. (1999), Combinatorial Algorithms, CRC Press LLC.
    [7]
    Moskowitz, S. A. & Cooperman, M. (1998), 'Method for stega-cipher protection of computer code', US Patent 5,745,569. Assignee: The Dice Company.
    [8]
    Nagra, J., Thomborson, C. & Collberg, C. (2002), A functional taxonomy for software watermarking, in M. Oudshoorn, ed., 'Proc. 25th Australasian Computer Science Conference 2002', ACS, pp. 177--186.
    [9]
    Palsberg, J., Krishnaswami, S., Kwon, M., Ma, D., Shao, Q. & Zhang, Y. (2001), Experience with software watermarking, in 'Proc. 16th Ann. Comp. Security Applications Conf. (ACSAC'00)', IEEE Computer Society, pp. 308--316.
    [10]
    RSA Laboratories (2002), 'Public-key cryptography standard (PKCS) #1 v2.1', ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1.pdf.

    Cited By

    View all
    • (2012)A first step towards algorithm plagiarism detectionProceedings of the 2012 International Symposium on Software Testing and Analysis10.1145/2338965.2336767(111-121)Online publication date: 15-Jul-2012
    • (2009)A semi-dynamic multiple watermarking schemefor java applicationsProceedings of the nineth ACM workshop on Digital rights management10.1145/1655048.1655058(59-72)Online publication date: 9-Nov-2009
    • (2007)Informed recognition in software watermarkingProceedings of the 2007 Pacific Asia conference on Intelligence and security informatics10.5555/1763599.1763631(257-261)Online publication date: 11-Apr-2007
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image DL Hosted proceedings
    ACSW Frontiers '04: Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
    January 2004
    192 pages

    Publisher

    Australian Computer Society, Inc.

    Australia

    Publication History

    Published: 01 January 2004

    Qualifiers

    • Article

    Conference

    ACSW Frontiers '04

    Acceptance Rates

    Overall Acceptance Rate 204 of 424 submissions, 48%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)17
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2012)A first step towards algorithm plagiarism detectionProceedings of the 2012 International Symposium on Software Testing and Analysis10.1145/2338965.2336767(111-121)Online publication date: 15-Jul-2012
    • (2009)A semi-dynamic multiple watermarking schemefor java applicationsProceedings of the nineth ACM workshop on Digital rights management10.1145/1655048.1655058(59-72)Online publication date: 9-Nov-2009
    • (2007)Informed recognition in software watermarkingProceedings of the 2007 Pacific Asia conference on Intelligence and security informatics10.5555/1763599.1763631(257-261)Online publication date: 11-Apr-2007
    • (2007)Dynamic graph-based software fingerprintingACM Transactions on Programming Languages and Systems10.1145/1286821.128682629:6(35-es)Online publication date: 1-Oct-2007
    • (2006)Manufacturing opaque predicates in distributed systems for code obfuscationProceedings of the 29th Australasian Computer Science Conference - Volume 4810.5555/1151699.1151721(187-196)Online publication date: 1-Jan-2006
    • (2006)Recognition in software watermarkingProceedings of the 4th ACM international workshop on Contents protection and security10.1145/1178766.1178776(29-36)Online publication date: 28-Oct-2006
    • (2006)Extraction in software watermarkingProceedings of the 8th workshop on Multimedia and security10.1145/1161366.1161398(175-181)Online publication date: 26-Sep-2006
    • (2006)A low-cost attack on branch-based software watermarking schemesProceedings of the 5th international conference on Digital Watermarking10.1007/11922841_23(282-293)Online publication date: 8-Nov-2006
    • (2005)A survey of software watermarkingProceedings of the 2005 IEEE international conference on Intelligence and Security Informatics10.1007/11427995_42(454-458)Online publication date: 19-May-2005

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media