2004
DOI: 10.1007/978-3-540-24691-6_21
|View full text |Cite
|
Sign up to set email alerts
|

Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
34
0

Year Published

2004
2004
2006
2006

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 39 publications
(34 citation statements)
references
References 15 publications
0
34
0
Order By: Relevance
“…Qu and Potkonjak [17,14] encode a watermark in a program's register allocation. Like all algorithms based on renaming, this is very fragile.…”
Section: Related Workmentioning
confidence: 99%
“…Qu and Potkonjak [17,14] encode a watermark in a program's register allocation. Like all algorithms based on renaming, this is very fragile.…”
Section: Related Workmentioning
confidence: 99%
“…Watermarking is a technique that embeds a secret message into the program to discourage IP theft by enabling the establishment of IP ownership [5,12]. Tamper-proofing technique protects software from being tampered by making the software with any unauthorized modification into a nonfunctional code.…”
Section: Software Watermarking and Obfuscatingmentioning
confidence: 99%
“…Obfuscation [2,3] is a major example and it attempts to thwart reverse engineering by making it hard to understand the behavior of a program. Also, software watermark and fingerprint [4,5] allow tracking of misused program copies by providing an additional deterrent to tampering. However, it may be effective for the cases that decompilation of binary code produces some high level of human recognition such as Java.…”
Section: Related Workmentioning
confidence: 99%