Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security 2015
DOI: 10.1145/2714576.2714582
|View full text |Cite
|
Sign up to set email alerts
|

Software Watermarking using Return-Oriented Programming

Abstract: We propose a novel dynamic software watermarking design based on Return-Oriented Programming (ROP). Our design formats watermarking code into well-crafted data arrangements that look like normal data but could be triggered to execute. Once triggered, the pre-constructed ROP execution will recover the hidden watermark message. The proposed ROP-based watermarking technique is more stealthy and resilient over existing techniques since the watermarking code is allocated dynamically into data region and therefore o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(21 citation statements)
references
References 28 publications
0
20
0
1
Order By: Relevance
“…The main idea of the proposed work taken from the recent proposed dynamic software watermark in [4] they use ROP and turn it into a good use and created new software watermark. The proposed software watermark collect the watermark codes from the existing code, in the data region the ROP convert codes into ROP gadgets and build them; these codes lead to unexpected execution path.…”
Section: Literature Reviewmentioning
confidence: 99%
See 4 more Smart Citations
“…The main idea of the proposed work taken from the recent proposed dynamic software watermark in [4] they use ROP and turn it into a good use and created new software watermark. The proposed software watermark collect the watermark codes from the existing code, in the data region the ROP convert codes into ROP gadgets and build them; these codes lead to unexpected execution path.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Therefore, it is a fact that the ROP is the most famous technique used in malicious uses. And the latest research proved that the ROP could be used not only for malicious uses but also in benign uses like software watermark [4].…”
Section:  Arithmetic and Logicmentioning
confidence: 99%
See 3 more Smart Citations