Watermarking, tamper-proofing, and obfuscation - tools for software protection
نویسندگان
چکیده
منابع مشابه
Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection
We identify three types of attack on the intellectual property contained in software, and three corresponding technical defenses. A potent defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense agains...
متن کاملWatermarking, tamper-proofing, and obfuscation-tools for software protection
component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these wo...
متن کاملWatermarking, Tamper-proong, and Obfuscation { Tools for Software Protection Watermarking, Tamper-prooong, and Obfuscation { Tools for Software Protection Module Reuse Sell Copy Buy One
We identify three types of attack on the intellectual property contained in software, and three corresponding technical defenses. A potent defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense agains...
متن کاملTamper-proofing Software Watermarks
We introduce a novel method called constant encoding, which can be used to tamper-proof a software watermark that is embedded in the dynamic data structures of a program. Our novel tamperproofing method is based on transforming numeric or non-numeric constant values in the text of the watermarked program into function calls whose value depends on the watermark data structure. Under reasonable a...
متن کاملH Function based Tamper-proofing Software Watermarking Scheme
A novel constant tamper-proofing software watermark technique based on H encryption function is presented. First we split the watermark into smaller pieces before encoding them using CLOC scheme. With the watermark pieces, a many-to-one function (H function) as the decoding function is constructed in order to avoid the pattern-matching or reverse engineering attack. The results of the function ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Software Engineering
سال: 2002
ISSN: 0098-5589
DOI: 10.1109/tse.2002.1027797