The evaluation of two software watermarking algorithms: Research Articles

  • Authors:
  • Ginger Myles;Christian Collberg;Zachary Heidepriem;Armand Navabi

  • Affiliations:
  • Department of Computer Science, University of Arizona, Tucson, AZ 85721, U.S.A.;Department of Computer Science, University of Arizona, Tucson, AZ 85721, U.S.A.;Department of Computer Science, University of Arizona, Tucson, AZ 85721, U.S.A.;Department of Computer Science, University of Arizona, Tucson, AZ 85721, U.S.A.

  • Venue:
  • Software—Practice & Experience
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we analyze the effectiveness of two different software watermarking algorithms. The first is an algorithm proposed by Akito Monden et al. and the second an algorithm proposed by Robert L. Davidson and Nathan Myhrvold of the Microsoft Corporation. We have implemented these techniques within the S ANDM ARK framework, a system designed to study the effectiveness of software protection algorithms on Java bytecode. To the best of our knowledge this is the first implementation and empirical evaluation of these algorithms with respect to a set of properties such as bit-rate, stealth, and resilience to attack. We demonstrate through the use of the S ANDM ARK framework that both of these algorithms have a high bit-rate but are unstealthy and easy to attack. Copyright © 2005 John Wiley & Sons, Ltd.