An Evaluation of Dynamic Java']Java Bytecode Software Watermarking Algorithms

被引:2
作者
Kumar, Krishan [1 ]
Kehar, Viney [2 ]
Kaur, Prabhpreet [2 ]
机构
[1] ICFAI Univ, Fac Sci & Technol, Baddi, HP, India
[2] NIT, Dept Comp Sci & Engn, Hamirpur, India
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2016年 / 10卷 / 07期
关键词
Software Piracy; !text type='Java']Java[!/text] Bytecode; Watermarking; Software Protection; Reverse engineering; obfuscation;
D O I
10.14257/ijsia.2016.10.7.13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the era of Information technology, Software Piracy and security has become one of the most important issue in world. Numbers of techniques have been proposed and implemented to prevent software piracy and illegal modification. Among all the protection techniques, software watermarking technique which attempts to protect the software by embedding copyright notice or unique identifiers into software to prove the ownership of software. Software Watermarking discourage piracy; as a proof of purchase or authorship; also helps in tracking the source of illegal redistribution of copies of software. We evaluate the existing dynamic watermarking algorithms using them to watermark java bytecode files and then applying distortive attacks to each watermarked program by obfuscating. Our study has shown that some watermarks were removed as results of these transformations.
引用
收藏
页码:147 / 156
页数:10
相关论文
共 22 条
[1]  
Arboit G., 2002, ICECR 5
[2]  
Collberg C., 1999, Conference Record of POPL '99. 26th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages, P311, DOI 10.1145/292540.292569
[3]  
Collberg C., 2002, TECH REP
[4]  
Collberg C., 2009, SURREPTITIOUS SOFTWA, V1st
[5]  
COLLBERG C, 1998, 164 U AUCKL DEP COMP
[6]   Software watermarking in the frequency domain: Implementation, analysis, and attacks [J].
Collberg, Christian ;
Sahoo, Tapas .
JOURNAL OF COMPUTER SECURITY, 2005, 13 (05) :721-755
[7]   Watermarking, tamper-proofing, and obfuscation - Tools for software protection [J].
Collberg, CS ;
Thomborson, C .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (08) :735-746
[8]  
Ertaul L, 2005, SERP '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, P209
[9]  
Ertaul L., 2004, IASTED C SOFTWARE EN, P133
[10]  
Kumar K., 2015, IJCSE, V3, P158