Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2480362.2480556acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

A novel watermarking method for Java programs

Published: 18 March 2013 Publication History

Abstract

Software piracy is one of the major concerns of programmers and software developers costing them huge amounts of financial losses every year. One of the programming languages used to develop software is Java. Although Java has some advantages over other languages, programs written using it are more vulnerable to software piracy than others. This is due to the fact that decompiling Java programs to their source codes is a relatively easy task. This paper proposed a novel method of watermarking Java programs. The suggested technique aimed to embed a watermark by means of appending a spurious If statement on to it. The proposed method was then implemented and tested in order to evaluate its security and resiliency against different types of attacks. The experimental results showed that the new method is more resilient to obfuscation and decompile-recompile attacks in comparison with the methods proposed by Genevieve Arboit in A Method for Watermarking Java Programs via Opaque Predicates [7] and Monden et al in A Practical Method for Watermarking Java Programs [5].

References

[1]
Curran, D., Hurley, N. and Cinneide, M. O. 2003. Securing java through software watermarking. In Proceedings of the 2nd International Conference on Principles and Practice of Programming in Java (Dublin, Ireland, June 17--19, 2003). PPPJ '03. ACM, New York, NY, 145--148.
[2]
Stern, J. P., Hachez, G., Koeune, F. and Quisquater, J. - J. 1999. Robust object watermarking: Application to code. In Proceedings of the Third International Workshop on Information Hiding (Dresden, Germany, September 21 -- October 01, 1999). IH '99. Springer-Verlag, London, UK, 368--379.
[3]
Collberg, C. and Thomborson, C. 1999. Robust object watermarking: Application to code. In Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (San Antonio, TX, USA, January 20--22, 1999). POPL '99. ACM, New York, NY, 311--324.
[4]
Myles, G. and Collberg, C. 2006. Software watermarking via opaque predicates: Implementation, analysis, and attacks. J. Electron. Commer. R. A. 6, 2 (April. 2006), 155--171.
[5]
Monden, A., Iida, H., Matsumoto, K., Inoue, K., Torii, K. 2000. A practical method for watermarking Java programs. In Proceedings of the 24th International Conference on Computer Software and Applications (Taipei, Taiwan, October 25 - 27, 2000). COMPSAC '00. IEEE Computer Society, Washington DC, USA, 191--197.
[6]
Zhu, W. F. 2007. Concepts and Techniques in Software Watermarking and Obfuscation. Doctoral Thesis, University of Auckland.
[7]
Arboit, G. 2002. A method for watermarking Java programs via opaque predicates (extended abstract). In Proceedings of the 5th International Conference on Electronic Commerce and Research (Montreal, Canada, October 23--27, 2002). ICECR-5.
[8]
Davidson, R. and Myhrvold, N. 1996. Method and system for generating and auditing a signature for a computer program. US Patent 5,559,884, Assignee: Microsoft Corporation.
[9]
Sahoo, T. and Collberg, C. 2004. Software Watermarking in the Frequency Domain: Implementation, Analysis, and Attacks. Technical Report. University of Arizona (USA).
[10]
Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, 1988.
[11]
Collberg, C., Myles, G. and Huntwork, A. Sandmark- a tool for software protection research. IEEE Security and Privacy, 1(4):40--49, 2003
[12]
http://sandmark.cs.arizona.edu/
[13]
http://java.decompiler.free.fr/
[14]
http://sites.google.com/site/joafshani/javasources/

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '13: Proceedings of the 28th Annual ACM Symposium on Applied Computing
March 2013
2124 pages
ISBN:9781450316569
DOI:10.1145/2480362
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 March 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Java protection
  2. copyright law
  3. software piracy
  4. software protection
  5. software watermarking

Qualifiers

  • Research-article

Conference

SAC '13
Sponsor:
SAC '13: SAC '13
March 18 - 22, 2013
Coimbra, Portugal

Acceptance Rates

SAC '13 Paper Acceptance Rate 255 of 1,063 submissions, 24%;
Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Oct 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media