Java security: hostile applets, holes&antidotes
Java security: hostile applets, holes&antidotes
Communications of the ACM
Java virtual machine
Practical legal aspects of software reverse engineering
Communications of the ACM
The Java developer's tool kit
Software watermarking: models and dynamic embeddings
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
IEEE Journal on Selected Areas in Communications
An abstract interpretation-based framework for software watermarking
Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Electronic Commerce Research
IBM Systems Journal
Extraction in software watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Software watermarking in the frequency domain: implementation, analysis, and attacks
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
On approximate matching of programs for protecting libre software
CASCON '06 Proceedings of the 2006 conference of the Center for Advanced Studies on Collaborative research
Dynamic graph-based software fingerprinting
ACM Transactions on Programming Languages and Systems (TOPLAS)
Detecting Theft of Java Applications via a Static Birthmark Based on Weighted Stack Patterns
IEICE - Transactions on Information and Systems
A method for detecting the theft of Java programs through analysis of the control flow information
Information and Software Technology
A semi-dynamic multiple watermarking schemefor java applications
Proceedings of the nineth ACM workshop on Digital rights management
Encoding watermark numbers as cographs using self-inverting permutations
Proceedings of the 12th International Conference on Computer Systems and Technologies
Soft IP protection: watermarking HDL codes
IH'04 Proceedings of the 6th international conference on Information Hiding
An ID-based watermarking scheme for java programs
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A survey of software watermarking
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Opaque predicates detection by abstract interpretation
AMAST'06 Proceedings of the 11th international conference on Algebraic Methodology and Software Technology
Watermarking essential data structures for copyright protection
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
A software watermark based architecture for cloud security
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
A novel watermarking method for Java programs
Proceedings of the 28th Annual ACM Symposium on Applied Computing
AppInk: watermarking android apps for repackaging deterrence
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Impact of software watermarking on smart devices
Proceedings of the 2013 Research in Adaptive and Convergent Systems
Hi-index | 0.00 |
Java programs distributed through Internet are now suffering from program theft. It is because Java programs can be easily decomposed into reusable class files and even decompiled into source code by program users. In this paper, we propose a practical method that discourages program theft by embedding Java programs with a digital watermark. Embedding a program developer's copyright notation as a watermark in Java class files will ensure the legal ownership of class files. Our embedding method is discernible by program users, yet enable us to identify an illegal program that contains stolen class files. The result of the experiment to evaluate our method showed most of the watermarks (20 out of 23) embedded in class files survived two kinds of attacks that attempt to erase watermarks: an obfuscactor attack, and a decompile-recompile attack.