Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2480362.2480673acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Protecting Android applications with steganography-based software watermarking

Published: 18 March 2013 Publication History

Abstract

In this paper, we propose a steganography-based software watermarking scheme to protect Android applications from software piracy. Considering the resource limitations in mobile devices, it is difficult to apply previous software watermarking schemes in mobile applications. To decrease the watermarking overhead in a watermarking scheme, such as a slowdown in the execution of applications after embedding a watermark, we proposed a different approach that applies steganography-based techniques in software watermarking. The proposed scheme embeds watermarks by reordering the sequence of instructions in the basic blocks in Dalvik executable files.

References

[1]
Ramarathnam, V., Vijay, V., and Saurabh, S., A Graph Theoretic Approach to Software Watermarking, In Proceedings of the International Information Hiding Workshop, pp. 157--168, 2001.
[2]
Christian, C. and Clark, T., Software Watermarking: Models and Dynamic Embeddings, In Proceedings of the ACM SIGPLAN-SIGACT symposium on Principles of Programming Languages, pp. 311--324, 1999.
[3]
Rakan, E. and Angelos., D. K., Hydan: Hiding Information in Program Binaries. In Proceedings of the ICICS Conference on Information and Communication Security, Vol. 3269, pp. 187--199, 2004.
[4]
Bertrand, A., Bjorn., D. S., Dominique, C., and Koen, D. B., Steganography for Executables and Code Transformation Signatures, In Proceedings of the ICICS Conference on Information and Communication Security, Vol. 3506, pp. 425--439, 2005.

Cited By

View all
  • (2021)Software Information Hiding Algorithm Based on Import Table of Portable Executable FileAdvances in Artificial Intelligence and Security10.1007/978-3-030-78621-2_24(301-311)Online publication date: 29-Jun-2021
  • (2017)TruApp: A TrustZone-based authenticity detection service for mobile apps2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)10.1109/WiMOB.2017.8115820(1-9)Online publication date: Oct-2017
  • (2017)DroidPosture: A trusted posture assessment service for mobile devices2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)10.1109/WiMOB.2017.8115762(1-8)Online publication date: Oct-2017
  • Show More Cited By

Index Terms

  1. Protecting Android applications with steganography-based software watermarking

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SAC '13: Proceedings of the 28th Annual ACM Symposium on Applied Computing
      March 2013
      2124 pages
      ISBN:9781450316569
      DOI:10.1145/2480362
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 18 March 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Android application
      2. software anti-piracy
      3. software watermarking
      4. steganography

      Qualifiers

      • Research-article

      Conference

      SAC '13
      Sponsor:
      SAC '13: SAC '13
      March 18 - 22, 2013
      Coimbra, Portugal

      Acceptance Rates

      SAC '13 Paper Acceptance Rate 255 of 1,063 submissions, 24%;
      Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

      Upcoming Conference

      SAC '25
      The 40th ACM/SIGAPP Symposium on Applied Computing
      March 31 - April 4, 2025
      Catania , Italy

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 24 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)Software Information Hiding Algorithm Based on Import Table of Portable Executable FileAdvances in Artificial Intelligence and Security10.1007/978-3-030-78621-2_24(301-311)Online publication date: 29-Jun-2021
      • (2017)TruApp: A TrustZone-based authenticity detection service for mobile apps2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)10.1109/WiMOB.2017.8115820(1-9)Online publication date: Oct-2017
      • (2017)DroidPosture: A trusted posture assessment service for mobile devices2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)10.1109/WiMOB.2017.8115762(1-8)Online publication date: Oct-2017
      • (2017)A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android SoftwareIEEE Transactions on Software Engineering10.1109/TSE.2016.261530743:6(492-530)Online publication date: 1-Jun-2017
      • (2015)Android App copy protection mechanism with semi-trusted loader2015 17th International Conference on Advanced Communication Technology (ICACT)10.1109/ICACT.2015.7224838(464-467)Online publication date: Jul-2015
      • (2014)Android App copy protection mechanism based on dynamic loadingThe 18th IEEE International Symposium on Consumer Electronics (ISCE 2014)10.1109/ISCE.2014.6884412(1-3)Online publication date: Jun-2014
      • (2013)Impact of software watermarking on smart devicesProceedings of the 2013 Research in Adaptive and Convergent Systems10.1145/2513228.2513330(361-362)Online publication date: 1-Oct-2013
      • (2013)Impact of multiple watermarks for protecting copyright of applications on smart mobile devicesProceedings of the 2013 Research in Adaptive and Convergent Systems10.1145/2513228.2513329(359-360)Online publication date: 1-Oct-2013

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media