Evaluating Effectiveness of Tamper Proofing on Dynamic Graph Software Watermarks

نویسندگان

  • Malik Sikandar Hayat Khiyal
  • Aihab Khan
  • Sehrish Amjad
  • M. Shahid Khalil
چکیده

For enhancing the protection level of dynamic graph software watermarks and for the purpose of conducting the analysis which evaluates the effect of integrating two software protection techniques such as software watermarking and tamper-proofing, constant encoding technique along with the enhancement through the idea of constant splitting is proposed. In this paper Thomborson technique has been implemented with the scheme of breaking constants which enables to encode all constants without having any consideration about their values with respect to the value of watermark tree. Experimental analysis which have been conducted and provided in this paper concludes that the constant encoding process significantly increases the code size, heap space usage, and execution time, while making the tamper-proofed code resilient to variety of semantic preserving program transformation attacks. (Abstract) Keywords-component; contsant encoding; software watermarking; tamper-proofing;

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tamper-proofing Software Watermarks

We introduce a novel method called constant encoding, which can be used to tamper-proof a software watermark that is embedded in the dynamic data structures of a program. Our novel tamperproofing method is based on transforming numeric or non-numeric constant values in the text of the watermarked program into function calls whose value depends on the watermark data structure. Under reasonable a...

متن کامل

A Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication

This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing. Each watermark bit is duplicated and randomly embedded in the original image in the discrete wavelet domain by modifying the corresponding image coefficients through quantization. The modifications are made so that they have little effect on the image and that the watermarking is robust against...

متن کامل

Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection

We identify three types of attack on the intellectual property contained in software, and three corresponding technical defenses. A potent defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense agains...

متن کامل

A Survey Of Graph Based Software Watermarking

Software watermarking involves embedding a unique identifier within a piece of software, to discourage software theft. The global revenue loss due to software piracy was estimated to be more than $50 billion in 2008. We survey the proposed software watermarking algorithms based on graph encoding. Graph based watermarking schemes, like other watermarking schemes, can be divided into two groups: ...

متن کامل

Towards a Telltale Watermarking Technique for Tamper-Proofing - Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on

In this paper we present a novel fragile watermarking scheme for the tamper-proofing of multimedia signals. Unlike previously proposed techniques, the novel approach provides spatial and frequency domain information on how the signal is modified. We call such a technique a telltale tamper-proofing method. Our design embeds a fragile watermark in the discrete wavelet domain of the signal by quan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1001.1974  شماره 

صفحات  -

تاریخ انتشار 2010