2011 World Congress on Internet Security (WorldCIS-2011) 2011
DOI: 10.1109/worldcis17046.2011.5749891
|View full text |Cite
|
Sign up to set email alerts
|

A survey of static software watermarking

Abstract: Software watermarks, which can be used to identify the intellectual property owner of a piece software, are broadly divided into two categories: static and dynamic. Static watermarks are embedded in the code and/or data of a computer program, whereas dynamic watermarking techniques store a watermark in a program's execution state. In this paper, we present a survey of the known static software watermarking techniques, including a brief explanation of each.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 56 publications
0
8
0
1
Order By: Relevance
“…First patented software watermarking efforts used the idea of code replacement; that is, the watermark value replaced the pre-decided part of code [29], [30]. Monden et al have explored watermarking of java programs and proposed several techniques by swapping byte code within dummy methods (implemented as jmark) [31], [32].…”
Section: G Code Replacement Algorithmsmentioning
confidence: 99%
“…First patented software watermarking efforts used the idea of code replacement; that is, the watermark value replaced the pre-decided part of code [29], [30]. Monden et al have explored watermarking of java programs and proposed several techniques by swapping byte code within dummy methods (implemented as jmark) [31], [32].…”
Section: G Code Replacement Algorithmsmentioning
confidence: 99%
“…Wang, et al (2018) encode the watermark by causing a program exception and monitoring the exception handling. Academics have also concentrated work in dynamic watermarking by making a software fingerprint distinct in terms of data structures (Kamela and Albluwib 2009) or using graph theory (Bento et al 2019) (Hamilton and Danicic 2020) (Colberg, Huntworth et al 2004).…”
Section: Related Workmentioning
confidence: 99%
“…Software watermarking involves embedding a unique identifier within a piece of software, to discourage the copying of software [67,75,77]. Watermarking does not prevent copyright infringement but instead discourages it by providing a means to identify the creator of a piece of software and/or the origin of copied software.…”
Section: Watermark Communitiesmentioning
confidence: 99%
“…These visualisations might also be useful for locating software watermarks [38,[75][76][77] or malware [36,166] within programs -allowing us to define better software watermarks, or easily remove malware.…”
Section: Visualising Software Dependence With Slice Graphsmentioning
confidence: 99%