Title of article :
More on graph theoretic software watermarks: Implementation, analysis, and attacks
Author/Authors :
Christian S. Collberg، نويسنده , , Christian and Huntwork، نويسنده , , Andrew and Carter، نويسنده , , Edward R. Townsend FRCS، نويسنده , , Gregg and Stepp، نويسنده , , Michael، نويسنده ,
Issue Information :
ماهنامه با شماره پیاپی سال 2009
Abstract :
This paper presents an implementation of the watermarking method proposed by Venkatesan et al. in their paper [R. Venkatesan, V. Vazirani, S. Sinha, A graph theoretic approach to software watermarking, in: Fourth International Information Hiding Workshop, Pittsburgh, PA, 2001]. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We present two algorithms for splitting a watermark number into a redundant set of pieces and an algorithm for turning a watermark number into a control-flow graph. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks.
Keywords :
Software piracy protection , Surreptitious software , Software protection , Software watermarking
Journal title :
Information and Software Technology
Journal title :
Information and Software Technology