Software watermarking is a digital technique used to protect software by embedding some secret information as identification in order to discourage software piracy and unauthorized modification. Watermarking is still a relatively new field and has good potential in protecting software from privacy threats. However, there appears to be a security vulnerability in the watermark trigger behaviour, and has been frequently attacked. By tracing the watermark trigger behaviour, attackers can easily intrude into the software and locate and expose the watermark for modification. In order to address this problem, we propose an algorithm that obscures the watermark trigger behaviour by utilizing buffer overflow. The code of the watermark trigger behaviour is removed from the software product itself, making it more difficult for attackers to trace the software. Experiments show that the new algorithm has promising performance in terms of the imperceptibility of software watermark.
Jiu-jun CHENG
Tongji University
Shangce GAO
Donghua University
Catherine VAIRAPPAN
Tateyama Institute of System
Rong-Long WANG
University of Fukui
Antti YLÄ-JÄÄSKI
Aalto University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Jiu-jun CHENG, Shangce GAO, Catherine VAIRAPPAN, Rong-Long WANG, Antti YLÄ-JÄÄSKI, "A Buffer Overflow Based Algorithm to Conceal Software Watermarking Trigger Behavior" in IEICE TRANSACTIONS on Information,
vol. E97-D, no. 3, pp. 524-532, March 2014, doi: 10.1587/transinf.E97.D.524.
Abstract: Software watermarking is a digital technique used to protect software by embedding some secret information as identification in order to discourage software piracy and unauthorized modification. Watermarking is still a relatively new field and has good potential in protecting software from privacy threats. However, there appears to be a security vulnerability in the watermark trigger behaviour, and has been frequently attacked. By tracing the watermark trigger behaviour, attackers can easily intrude into the software and locate and expose the watermark for modification. In order to address this problem, we propose an algorithm that obscures the watermark trigger behaviour by utilizing buffer overflow. The code of the watermark trigger behaviour is removed from the software product itself, making it more difficult for attackers to trace the software. Experiments show that the new algorithm has promising performance in terms of the imperceptibility of software watermark.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E97.D.524/_p
Copy
@ARTICLE{e97-d_3_524,
author={Jiu-jun CHENG, Shangce GAO, Catherine VAIRAPPAN, Rong-Long WANG, Antti YLÄ-JÄÄSKI, },
journal={IEICE TRANSACTIONS on Information},
title={A Buffer Overflow Based Algorithm to Conceal Software Watermarking Trigger Behavior},
year={2014},
volume={E97-D},
number={3},
pages={524-532},
abstract={Software watermarking is a digital technique used to protect software by embedding some secret information as identification in order to discourage software piracy and unauthorized modification. Watermarking is still a relatively new field and has good potential in protecting software from privacy threats. However, there appears to be a security vulnerability in the watermark trigger behaviour, and has been frequently attacked. By tracing the watermark trigger behaviour, attackers can easily intrude into the software and locate and expose the watermark for modification. In order to address this problem, we propose an algorithm that obscures the watermark trigger behaviour by utilizing buffer overflow. The code of the watermark trigger behaviour is removed from the software product itself, making it more difficult for attackers to trace the software. Experiments show that the new algorithm has promising performance in terms of the imperceptibility of software watermark.},
keywords={},
doi={10.1587/transinf.E97.D.524},
ISSN={1745-1361},
month={March},}
Copy
TY - JOUR
TI - A Buffer Overflow Based Algorithm to Conceal Software Watermarking Trigger Behavior
T2 - IEICE TRANSACTIONS on Information
SP - 524
EP - 532
AU - Jiu-jun CHENG
AU - Shangce GAO
AU - Catherine VAIRAPPAN
AU - Rong-Long WANG
AU - Antti YLÄ-JÄÄSKI
PY - 2014
DO - 10.1587/transinf.E97.D.524
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E97-D
IS - 3
JA - IEICE TRANSACTIONS on Information
Y1 - March 2014
AB - Software watermarking is a digital technique used to protect software by embedding some secret information as identification in order to discourage software piracy and unauthorized modification. Watermarking is still a relatively new field and has good potential in protecting software from privacy threats. However, there appears to be a security vulnerability in the watermark trigger behaviour, and has been frequently attacked. By tracing the watermark trigger behaviour, attackers can easily intrude into the software and locate and expose the watermark for modification. In order to address this problem, we propose an algorithm that obscures the watermark trigger behaviour by utilizing buffer overflow. The code of the watermark trigger behaviour is removed from the software product itself, making it more difficult for attackers to trace the software. Experiments show that the new algorithm has promising performance in terms of the imperceptibility of software watermark.
ER -