منابع مشابه
A Practical Method for Watermarking Java Programs
Java programs distributed through Internet are now suffering from program theft. It is because Java programs can be easily decomposed into reusable class files and even decompiled into source code by program users. In this paper we propose a practical method that discourages program theft by embedding Java programs with a digital watermark. Embedding a program developer’s copyright notation as ...
متن کاملWatermarking Java Programs
DYD SURJUDPV GLVWULEXWHG WKURXJK ,QWHUQHW DUH QRZ VXIIHULQJ IURP SURJUDP WKHIW ,W LV EHFDXVH -DYD SURJUDPV FDQ EH HDVLO\ GHFRPSRVHG LQWR UHXVDEOH FODVVILOHV DQG HYHQ GHFRPSLOHG LQWR VRXUFH FRGH E\ SURJUDP XVHUV ,Q WKLV SDSHU ZH SURSRVH D WHFKQLTXH WKDW GLVFRXUDJHV SURJUDP WKHIW E\ HPEHGGLQJ -DYD SURJUDPV ZLWK D GLJLWDO ZDWHUPDUN (PEHGGLQJ D SURJUDP GHYHORSHU V VLJQDWXUH DV D ZDWHUPDUN LQ -DYD F...
متن کاملSecuring Java through software watermarking
An important advantage of Java is its portability due to its use of byte ode. However the use of byte ode allows de ompilation of Java programs to gain a ess to their sour e ode. This makes it easier to pirate Java programs, infringing their opyright. This is a disadvantage of Java in omparison with programming languages that ompile to native obje t ode. Software watermarking is a relatively ne...
متن کاملA Method for Watermarking Java Programs via Opaque Predicates
In this paper, we present a method for watermarking Java programs that uses opaque predicates, improving upon those presented in two previous papers [13, 9]. We present two algorithms: the first is simpler to implement and to analyze, but certain distortive attacks can make watermark extraction difficult; the second is more complex, but under realistic assumptions yields good resistance to all ...
متن کاملZero-knowledge Software Watermarking for C Programs
This paper proposes a novel method for watermarking C source code by exploiting the programming language features.The key idea of our watermarking scheme is a semantics-preserving program transformation, based on a hidden permutation of local identifiers, followed by another hidden permutation of the functions defined in the source code. This last permutation allows to encrypt the prove of owne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of the Korean Institute of Information and Communication Engineering
سال: 2010
ISSN: 2234-4772
DOI: 10.6109/jkiice.2010.14.9.2049