Software watermarking: models and dynamic embeddings
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Multilevel k-way hypergraph partitioning
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
On the performance of spectral graph partitioning methods
Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms
Finding Separator Cuts in Planar Graphs within Twice the Optimal
SIAM Journal on Computing
Spectral partitioning works: planar graphs and finite element meshes
FOCS '96 Proceedings of the 37th Annual Symposium on Foundations of Computer Science
The regularity lemma and approximation schemes for dense problems
FOCS '96 Proceedings of the 37th Annual Symposium on Foundations of Computer Science
SFCS '88 Proceedings of the 29th Annual Symposium on Foundations of Computer Science
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Sandmark--A Tool for Software Protection Research
IEEE Security and Privacy
Dynamic path-based software watermarking
Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation
Software piracy prevention through diversity
Proceedings of the 4th ACM workshop on Digital rights management
Hybrid static-dynamic attacks against software protection mechanisms
Proceedings of the 5th ACM workshop on Digital rights management
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Electronic Commerce Research
IBM Systems Journal
Extraction in software watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Software watermarking in the frequency domain: implementation, analysis, and attacks
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Proteus: virtualization for diversified tamper-resistance
Proceedings of the ACM workshop on Digital rights management
Key evolution-based tamper resistance: a subgroup extension
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Dynamic graph-based software fingerprinting
ACM Transactions on Programming Languages and Systems (TOPLAS)
Study of algorithms on machines through graphs II
ROCOM'07 Proceedings of the 7th WSEAS International Conference on Robotics, Control & Manufacturing Technology
More on graph theoretic software watermarks: Implementation, analysis, and attacks
Information and Software Technology
A semi-dynamic multiple watermarking schemefor java applications
Proceedings of the nineth ACM workshop on Digital rights management
Watermarking techniques for electronic circuit design
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
Encoding watermark integers as self-inverting permutations
Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing on International Conference on Computer Systems and Technologies
Encoding watermark numbers as cographs using self-inverting permutations
Proceedings of the 12th International Conference on Computer Systems and Technologies
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Graph theoretic software watermarks: implementation, analysis, and attacks
IH'04 Proceedings of the 6th international conference on Information Hiding
IH'04 Proceedings of the 6th international conference on Information Hiding
Soft IP protection: watermarking HDL codes
IH'04 Proceedings of the 6th international conference on Information Hiding
Indexing information for data forensics
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Self-validating branch-based software watermarking
IH'05 Proceedings of the 7th international conference on Information Hiding
Data hiding in compiled program binaries for enhancing computer system performance
IH'05 Proceedings of the 7th international conference on Information Hiding
Dither modulation watermarking of dynamic memory traces
IH'05 Proceedings of the 7th international conference on Information Hiding
A survey of software watermarking
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Steganography for executables and code transformation signatures
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Software tamper resistance through dynamic program monitoring
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Algorithms to watermark software through register allocation
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
A low-cost attack on branch-based software watermarking schemes
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Watermarking essential data structures for copyright protection
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Multiple encoding of a watermark number into reducible permutation graphs using cotrees
Proceedings of the 13th International Conference on Computer Systems and Technologies
A robust steganography-based software watermarking
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Protecting Android applications with steganography-based software watermarking
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Evaluating the WaterRpg software watermarking model on Java application programs
Proceedings of the 17th Panhellenic Conference on Informatics
Watermarking Java application programs using the WaterRpg dynamic model
Proceedings of the 14th International Conference on Computer Systems and Technologies
Hi-index | 0.00 |
We present a graph theoretic approach for watermarking software in a robust fashion. While watermarking software that are small in size (e.g. a few kilobytes) may be infeasible through this approach, it seems to be a viable scheme for large applications. Our approach works with control/data flow graphs and uses abstractions, approximate k-partitions, and a random walk method to embed the watermark, with the goal of minimizing and controlling the additions to be made for embedding, while keeping the estimated effort to undo the watermark (WM) as high as possible. The watermarks are so embedded that small changes to the software or flow graph are unlikely to disable detection by a probabilistic algorithm that has a secret. This is done by using some relatively robust graph properties and error correcting codes.Under some natural assumptions about the code added to embed the WM, locating the WM by an attacker is related to some graph approximation problems. Since little theoretical foundation exists for hardness of typical instances of graph approximation problems, we present heuristics to generate such hard instances and, in a limited case, present a heuristic analysis of how hard it is to separate the WM in an information theoretic model. We describe some related experimental work. The approach and methods described here also suitable for solving the problem of software tamper resistance.