Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Software Watermarking for Java Program Based on Method Name Encoding

  • Conference paper
  • First Online:
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017 (AISI 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 639))

Abstract

This paper proposes a software watermarking scheme for Java programs that is based on method name encoding. The feature of Java reflection is utilized to obtain the method names in a Java program. Watermark bits are divided into pieces according to the number of the method names. Each piece of the watermark bits is encoded with a method name, which hence achieves the embedding of the watermark. Based on the approach, an experiment system is developed to embed and extract watermark information in a practical Java program. The experimental test and performance analysis show that the proposed method is feasible and has good performances of security and robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Falcarin, P., Collberg, C., Atallah, M., Jakubowski, M.: Software protection. IEEE Softw. 3(4), 24–27 (2011)

    Article  Google Scholar 

  2. Bao, F., Peng, J., Fang, Z.: Review of protection methods for java class files. Appl. Comput. Syst. 6, 124–126 (2007)

    Google Scholar 

  3. Hamilton, J., Danicic, S.: An evaluation of current java bytecode decompilers. In: Ninth IEEE International Workshop on Source Code Analysis and Manipulation, Edmonton, Canada, 20–21 September, pp. 129–136 (2009)

    Google Scholar 

  4. Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Trans. Softw. Eng. 8, 735746 (2002)

    Google Scholar 

  5. Davidson, R., Myhrvold, N.: Method and System for Generating and Auditing a Signature for a Computer Program, US Patent 5559884, Microsoft Corporation (1996)

    Google Scholar 

  6. Qu, G., Potkonjak, M.: Analysis of watermarking techniques for graph coloring problem. In: IEEE/ACM International Conference on Computer Aided Design, San Jose, USA, 8–12 November, pp. 190–193 (1998)

    Google Scholar 

  7. Collberg, C., Carter, E., Debray, S.: Dynamic path-based software watermarking. In: Proceedings of ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 107–118. ACM Press, New York (2004)

    Google Scholar 

  8. Stern, J., Hachez, G., Koeune, F., Quisquater, J.: Robust object watermarking: application to code. In: Proceedings of the Third International Workshop on Information Hiding. Lecture Notes in Computer Science, pp. 368–378. Springer (2000)

    Google Scholar 

  9. Collberg, C., Sahoo, T.R.: Software watermarking in the frequency domain: implementation, analysis, and attacks. J. Comput. Secur. 5, 721–755 (2005)

    Article  Google Scholar 

  10. Venkatesan, R., Vazirani, V., Sinha, S.: A graph theoretic approach to software watermarking. In: Proceedings of the 4th International Information Hiding Workshop, pp. 157–168. ACM Press, New York (2001)

    Google Scholar 

  11. Collberg, C., Huntwork, A., Carter, E.: More on graph theoretic software watermarks: Implementation, analysis, and attacks. Inf. Softw. Technol. 1, 56–67 (2009)

    Article  Google Scholar 

  12. Cousot, P., Cousot, R.: An abstract interpretation-based framework for software watermarking. In: Proceedings of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 173–185. ACM press, New York (2004)

    Google Scholar 

  13. Monden, A., Iida, H., Matsumoto, K.: A practical method for watermarking java programs. In: The 24th International Computer Software and Applications Conference, Taipei, Taiwan, 25–27 October, pp. 191–197 (2000)

    Google Scholar 

  14. Chen, J., Wang, C., Shi, Q., Lv, G.: Implementation of bytecode-based software watermarking for java programs. In: The IASTED International Conference on Communication and Information Security, Marina Del Rey, USA, 4–6 December, pp. 542–547 (2010)

    Google Scholar 

  15. Li, K., Chen, J., Shi, Q., Li, G.: Design of contradiction structure for dummy method insertion in java software watermarking. Comput. Sci. 12, 211–214 (2013)

    Google Scholar 

  16. Kapi, A.Y., Ibrahim, S.: Fixed size encoding scheme for software watermarking. In: 2011 7th International Conference on Information Assurance and Security, Melaka, Malaysia, 5–8 December, pp. 35–39 (2011)

    Google Scholar 

  17. Pervez, Z., Qayyum, N., Mahmood, Y., Ahmad, H.F.: Semblance based disseminated software watermarking algorithm. In: The 23rd International Symposium on Computer and Information Sciences, Istanbul, Turkey, 27–29 October, pp. 1–4 (2008)

    Google Scholar 

  18. Chan, P., Hui, L., Yiu, S.M.: Heap graph based software theft detection. IEEE Trans. Inf. Forensics Secur. 1, 101–110 (2013)

    Article  Google Scholar 

  19. Patel, S., Pattewar T.: Software birthmark based theft detection of JavaScript programs using agglomerative clustering and improved frequent subgraph mining. In: 2014 International Conference on Advances in Electronics Computers and Communications, Bangalore, India, 10–11 October, pp. 1–6 (2014)

    Google Scholar 

  20. Tian, Z., Zheng, Q., Liu, T., Fan, M., Zhuang, E., Zijiang Yang, Z.: Software plagiarism detection with birthmarks based on dynamic key instruction sequences. IEEE Trans. Softw. Eng. 41(12), 1217–1235 (2015)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (grant No. 61602267) and the Nantong Municipal Application Research Funding of China (grant No. GY2015012).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianping Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Chen, J., Li, K., Wen, W., Chen, W., Yan, C. (2018). Software Watermarking for Java Program Based on Method Name Encoding. In: Hassanien, A., Shaalan, K., Gaber, T., Tolba, M. (eds) Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017. AISI 2017. Advances in Intelligent Systems and Computing, vol 639. Springer, Cham. https://doi.org/10.1007/978-3-319-64861-3_81

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64861-3_81

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64860-6

  • Online ISBN: 978-3-319-64861-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics