An abstract interpretation-based framework for software watermarking

被引:36
作者
Cousot, P
Cousot, R
机构
[1] Ecole Normale Super, F-75230 Paris 05, France
[2] CNRS, F-91128 Palaiseau, France
[3] Ecole Polytech, F-91128 Palaiseau, France
关键词
abstract interpretation; authentication; copyrights protection; fingerprinting; identification; intellectual property protection; obfuscation; software authorship; software watermarking; static analysis; steganography; stegoanalyst; stegoattacks; stegokey; stegomark; stegosignature; tamper-proofing; trustworthiness; validation watermarking;
D O I
10.1145/982962.964016
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software watermarking consists in the intentional embedding of indelible stegosignatures or watermarks into the subject software and extraction of the stegosignatures embedded in the stegoprograms for purposes such as intellectual property protection. We introduce the novel concept of abstract software watermarking. The basic idea is that the watermark is hidden in the program code in such a way that it can only be extracted by an abstract interpretation of the (maybe non-standard) concrete semantics of this code. This static analysis-based approach allows the watermark to be recovered even if only a small part of the program code is present and does not even need that code to be executed. We illustrate the technique by a simple abstract watermarking protocol for methods of Java(TM) classes. The concept applies equally well to any other kind of software (including hardware originally specified by software).
引用
收藏
页码:173 / 185
页数:13
相关论文
共 20 条
  • [1] Arboit G., 2002, P INT C EL COMM RES
  • [2] BARAK B, 2001, LNCS, V2139, P1, DOI DOI 10.1007/3-540-44647-8
  • [3] Breaking abstractions and unstructuring data structures
    Collberg, C
    Thomborson, C
    Low, D
    [J]. 1998 INTERNATIONAL CONFERENCE ON COMPUTER LANGUAGES, PROCEEDINGS, 1998, : 28 - 38
  • [4] COLLBERG C, 1997, 24 POPL SAN ANT TX 2, P311
  • [5] COLLBERG C, 1998, 25 S PRINC PROGR LAN, P184
  • [6] Watermarking, tamper-proofing, and obfuscation - Tools for software protection
    Collberg, CS
    Thomborson, C
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (08) : 735 - 746
  • [7] Cousot P., 1984, AUTOMATIC PROGRAM CO, P243
  • [8] Cousot Patrick, 1979, POPL, P269, DOI DOI 10.1145/567752.567778
  • [9] GOSLER JR, 1986, LECT NOTES COMPUT SC, V218, P140
  • [10] STATIC ANALYSIS OF ARITHMETICAL CONGRUENCES
    GRANGER, P
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1989, 30 (3-4) : 165 - 190