2007
DOI: 10.1145/1286821.1286826
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic graph-based software fingerprinting

Abstract: Fingerprinting embeds a secret message into a cover message. In media fingerprinting, the secret is usually a copyright notice and the cover a digital image. Fingerprinting an object discourages intellectual property theft, or when such theft has occurred, allows us to prove ownership.The Software Fingerprinting problem can be described as follows. Embed a structure W into a program P such that: W can be reliably located and extracted from P even after P has been subjected to code transformations such as trans… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 48 publications
(25 citation statements)
references
References 44 publications
0
23
0
Order By: Relevance
“…The dynamic watermarks are embedded in such a way that the identifiers can be extracted while programs are running with predefined input sequences. There have been several approaches for dynamic watermarking, such as Easter egg watermark [13,14], data structure watermark [13], execution trace watermark [16,17], and branch-based watermark [31]. Software watermarking methods can be applied only to programs that have been watermarked before releasing.…”
Section: Related Workmentioning
confidence: 99%
“…The dynamic watermarks are embedded in such a way that the identifiers can be extracted while programs are running with predefined input sequences. There have been several approaches for dynamic watermarking, such as Easter egg watermark [13,14], data structure watermark [13], execution trace watermark [16,17], and branch-based watermark [31]. Software watermarking methods can be applied only to programs that have been watermarked before releasing.…”
Section: Related Workmentioning
confidence: 99%
“…The information may use pointers to hide graphs since pointer analysis is NP-complete [15]. Collberg et al [16] use a radix graph to hide a watermark in programs. When a program is executed with a certain input, the hidden watermark is revealed to identify the software as copyrighted.…”
Section: Software Watermarkingmentioning
confidence: 99%
“…Graph-based watermarking: the dynamic graph-based watermarking encodes the watermark in a suitable data-structure which is allocated in memory [12,42]. In this case, programs states are as above, including the sequence of input values i ∈ V * which still have to be consumed: c, R, H, i , η = {I, Σ * } where i ∈ V * is a given input sequence, Ñ = {E(s), Σ * } where E(s) is the encoding of s as a graph G s ∈ G. α observes the graphs encoded in memory, by looking at graphs in reverse allocation order.…”
Section: Hiding Informationmentioning
confidence: 99%