A robust software watermarking framework using shellcode

被引:0
|
作者
Ayan Dey
Shibashis Ghosh
Sukriti Bhattacharya
Nabendu Chaki
机构
[1] University of Calcutta,A. K. Choudhury School of I.T.
[2] Luxembourg Institute of Science & Technology (LIST),Environmental Informatics, Department of Environmental Research and Innovation (ERIN)
[3] University of Calcutta,Department of Computer Science and Engg.
来源
关键词
Software watermarking; Shellcode; Encryption; Hash functions;
D O I
暂无
中图分类号
学科分类号
摘要
Watermarks have long been applied to ensure the authenticity of media contents. Computer software is an intellectual outcome in the digital domain. Therefore, it has to face all the common threats like illegal redistribution, copying, misuse through malicious modification. However, the majority of the existing software watermarking techniques are suffering from the limitations of existing robustness notions and lack of resilience from a variety of attacks. In this paper, we proposed a novel robust software watermarking scheme based on “shellcode”. It is a small piece of code generally used as the payload in the exploitation of a software vulnerability. It consists of a list of carefully arranged machine instructions, executed through injecting into a running application. Shellcode serves as the backbone of our proposed watermarking scheme. It is used to achieve both covert communication (steganography), and deterrence (watermarking) process in the proposed watermarking technique. Such a combination gives more robustness and security to the whole process. In this paper, we introduce ShellMark as a proof of concept to illustrate the shellcode based software watermarking technique. We compared and tested ShellMark with already existing software watermarking techniques, and it showed that ShellMark is resilient to most of the well known watermarking attacks.
引用
收藏
页码:2555 / 2576
页数:21
相关论文
共 50 条
  • [31] ROSEmark: Robust semi-blind ECG watermarking scheme using SWT-DCT framework
    Kumar, Subodh
    Rajpal, Ankit
    Sharma, Neeraj Kumar
    Rajpal, Sheetal
    Nayyar, Anand
    Kumar, Naveen
    DIGITAL SIGNAL PROCESSING, 2022, 129
  • [32] Finding robust domain from attacks: A learning framework for blind watermarking
    Mun, Seung-Min
    Nam, Seung-Hun
    Jang, Haneol
    Kim, Dongkyu
    Lee, Heung-Kyu
    NEUROCOMPUTING, 2019, 337 : 191 - 202
  • [33] Spatial Domain-Based Robust Watermarking Framework for Cultural Images
    Mehraj, Samrah
    Mushtaq, Subreena
    Parah, Shabir A.
    Giri, Kaiser J.
    Sheikh, Javaid A.
    Gandomi, Amir H.
    Hijji, Mohammad
    Muhammad, Khan
    IEEE ACCESS, 2022, 10 : 117248 - 117260
  • [34] Retraction Note: A robust blind watermarking framework based on Dn structure
    Satendra Pal Singh
    Gaurav Bhatnagar
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (Suppl 1) : 291 - 291
  • [35] Embedding Guided End-to-End Framework for Robust Image Watermarking
    Zhang, Beibei
    Wu, Yunqing
    Chen, Beijing
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [36] Robust Blind Watermarking Framework for Hybrid Networks Combining CNN and Transformer
    Wang, Baowei
    Song, Ziwei
    Wu, Yufeng
    ASIAN CONFERENCE ON MACHINE LEARNING, VOL 222, 2023, 222
  • [37] Xmark: Dynamic Software Watermarking Using Collatz Conjecture
    Ma, Haoyu
    Jia, Chunfu
    Li, Shijia
    Zheng, Wantong
    Wu, Dinghao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (11) : 2859 - 2874
  • [38] Robust digital watermarking using random casting method
    Kim, JS
    Kim, TH
    Kim, ES
    MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION IV, WITH APPLICATIONS, 2001, 4475 : 267 - 276
  • [39] Robust Image Watermarking using Fractional Sinc Transformation
    Abbasi, Almas
    Woo, Chaw Seng
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (09) : 184 - 189
  • [40] Robust image watermarking algorithm using chaotic sequences
    Artiles, Jose A. P.
    Chaves, Daniel P. B.
    Pimentel, Cecilio
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 68