2014
DOI: 10.1587/transinf.e97.d.524
|View full text |Cite
|
Sign up to set email alerts
|

A Buffer Overflow Based Algorithm to Conceal Software Watermarking Trigger Behavior

Abstract: SUMMARYSoftware watermarking is a digital technique used to protect software by embedding some secret information as identification in order to discourage software piracy and unauthorized modification. Watermarking is still a relatively new field and has good potential in protecting software from privacy threats. However, there appears to be a security vulnerability in the watermark trigger behaviour, and has been frequently attacked. By tracing the watermark trigger behaviour, attackers can easily intrude int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Software watermarking can be classified as static or dynamic depending on the occasion of watermark embedding and extraction [2]. The carrier program is considered a static object in the static watermarking, and the watermark is embedded into the static data or code; examples include code replacement [3], basic block reordering [4], register allocation [5], opacity predicate [6], graph coding [7], and Java method name encoding [8] watermarking algorithms and impeding Android application repackaging [9].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Software watermarking can be classified as static or dynamic depending on the occasion of watermark embedding and extraction [2]. The carrier program is considered a static object in the static watermarking, and the watermark is embedded into the static data or code; examples include code replacement [3], basic block reordering [4], register allocation [5], opacity predicate [6], graph coding [7], and Java method name encoding [8] watermarking algorithms and impeding Android application repackaging [9].…”
Section: Introductionmentioning
confidence: 99%
“…These methods extract the embedded watermark from the stack data structure during program execution. Another example is operation status watermarking [17], such as return-oriented programming-based [18], buffer overflow-based [2], and control flow obfuscation-based watermarking algorithms [19]. The return-oriented programming-based watermarking algorithm decomposes a watermark and spreads it in the different parts of the program.…”
Section: Introductionmentioning
confidence: 99%