The search functionality is under construction.

IEICE TRANSACTIONS on Information

A Buffer Overflow Based Algorithm to Conceal Software Watermarking Trigger Behavior

Jiu-jun CHENG, Shangce GAO, Catherine VAIRAPPAN, Rong-Long WANG, Antti YLÄ-JÄÄSKI

  • Full Text Views

    0

  • Cite this

Summary :

Software watermarking is a digital technique used to protect software by embedding some secret information as identification in order to discourage software piracy and unauthorized modification. Watermarking is still a relatively new field and has good potential in protecting software from privacy threats. However, there appears to be a security vulnerability in the watermark trigger behaviour, and has been frequently attacked. By tracing the watermark trigger behaviour, attackers can easily intrude into the software and locate and expose the watermark for modification. In order to address this problem, we propose an algorithm that obscures the watermark trigger behaviour by utilizing buffer overflow. The code of the watermark trigger behaviour is removed from the software product itself, making it more difficult for attackers to trace the software. Experiments show that the new algorithm has promising performance in terms of the imperceptibility of software watermark.

Publication
IEICE TRANSACTIONS on Information Vol.E97-D No.3 pp.524-532
Publication Date
2014/03/01
Publicized
Online ISSN
1745-1361
DOI
10.1587/transinf.E97.D.524
Type of Manuscript
PAPER
Category
Information Network

Authors

Jiu-jun CHENG
  Tongji University
Shangce GAO
  Donghua University
Catherine VAIRAPPAN
  Tateyama Institute of System
Rong-Long WANG
  University of Fukui
Antti YLÄ-JÄÄSKI
  Aalto University

Keyword