2006
DOI: 10.1007/s10660-006-6955-z
|View full text |Cite
|
Sign up to set email alerts
|

Software watermarking via opaque predicates: Implementation, analysis, and attacks

Abstract: Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on how a software watermark is applied it can be used to discourage piracy; as proof of authorship or purchase; or to track the source of the illegal redistribution. In particular we analyze an algorithm originally proposed by Geneviève Arboit in A Method for Watermarking Java Programs via Opaque Predicates. This watermarking technique emb… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
50
0
1

Year Published

2006
2006
2018
2018

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 61 publications
(51 citation statements)
references
References 12 publications
0
50
0
1
Order By: Relevance
“…Additive attack: In these attacks, another watermark is added by an adversary to the effectively watermarked system so as to provide reason to feel ambiguous about which watermark was included first [7].…”
Section: Types Of Attacks To Watermarks [2]mentioning
confidence: 99%
“…Additive attack: In these attacks, another watermark is added by an adversary to the effectively watermarked system so as to provide reason to feel ambiguous about which watermark was included first [7].…”
Section: Types Of Attacks To Watermarks [2]mentioning
confidence: 99%
“…In fact, the mechanism actually modifies the conditions or expressions of these control statements by adding opaque predicates [12].…”
Section: (Ii) Model Componentsmentioning
confidence: 99%
“…Although digital watermarking has made considerable progress and became a popular technique for copyright protection of multimedia information [8], research on software watermarking has recently received sufficient attention. The major software watermarking algorithms currently available are based on several techniques, among which are the register allocation [15], spread-spectrum [16], code re-orderings [13], opaque predicate [12], dynamic path techniques [3]; see also, Collberg and Nagra [6] for an exposition of the main results.…”
Section: Introductionmentioning
confidence: 99%
“…In fact, the mechanism actually modifies the conditions or expressions of these control statements by adding opaque predicates [4,13].…”
Section: (Ii) Model Componentsmentioning
confidence: 99%
“…The software watermarking problem can be described as the problem of embedding a structure w into a program P such that w can be reliably located and extracted from P even after P has been subjected to code transformations such as translation, optimization and obfuscation [13].…”
Section: Introductionmentioning
confidence: 99%