Filters








433 Hits in 5.1 sec

A Low-Cost Attack on Branch-Based Software Watermarking Schemes [chapter]

Gaurav Gupta, Josef Pieprzyk
2006 Lecture Notes in Computer Science  
In 2005, Ginger Myles and Hongxia Jin proposed a software watermarking scheme based on converting jump instructions or unconditional branch statements (UBSs) by calls to a fingerprint branch function (  ...  The major steps in the attack are automated resulting in a fast and low-cost attack.  ...  Conclusion and Future Work In this paper, we present a successful low-cost attack on the branch-based watermarking scheme proposed in [8] .  ... 
doi:10.1007/11922841_23 fatcat:jbbi5l7zj5hx5mp5u36qz4u5nu

Dynamic path-based software watermarking

C. Collberg, E. Carter, S. Debray, A. Huntwork, J. Kececioglu, C. Linn, M. Stepp
2004 Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation - PLDI '04  
This paper introduces path-based watermarking, a new approach to software watermarking based on the dynamic branching behavior of programs.  ...  Software watermarking is a tool used to combat software piracy by embedding identifying information into a program.  ...  Sec- tion 2 gives some background on software watermarking and describes the basic idea behind path-based watermarking.  ... 
doi:10.1145/996841.996856 dblp:conf/pldi/CollbergCDHKLS04 fatcat:rluj7zxsozandd62e4zsbyiuvy

Dynamic path-based software watermarking

C. Collberg, E. Carter, S. Debray, A. Huntwork, J. Kececioglu, C. Linn, M. Stepp
2004 SIGPLAN notices  
This paper introduces path-based watermarking, a new approach to software watermarking based on the dynamic branching behavior of programs.  ...  Software watermarking is a tool used to combat software piracy by embedding identifying information into a program.  ...  Sec- tion 2 gives some background on software watermarking and describes the basic idea behind path-based watermarking.  ... 
doi:10.1145/996893.996856 fatcat:zpl3euy4qfhf3bvqtd2v573teu

Climate signatures of grape harvest dates

M. Krieger, G. Lohmann, T. Laepple
2010 Climate of the Past Discussions  
This paper introduces path-based watermarking, a new approach to software watermarking based on the dynamic branching behavior of programs.  ...  Software watermarking is a tool used to combat software piracy by embedding identifying information into a program.  ...  Sec- tion 2 gives some background on software watermarking and describes the basic idea behind path-based watermarking.  ... 
doi:10.5194/cpd-6-1525-2010 fatcat:yim43tz2abcqpkjjj6gycmvkxm

A semi-dynamic multiple watermarking schemefor java applications

Changjiang Zhang, Jianmin Wang, Clark Thomborson, Chaokun Wang, Christian Collberg
2009 Proceedings of the nineth ACM workshop on Digital rights management - DRM '09  
The extraction in this scheme, which is based on dynamically loading a reconstructed program to recover the watermark, is also a novel approach to the software watermarking field.  ...  In this paper, we address this issue through a prevention technique called software watermarking, and we propose a novel software watermarking scheme, which can embed multiple non-interfering watermarks  ...  We also acknowledge China Telecom Corporation Limited Shanghai Branch for their strong support on our work.  ... 
doi:10.1145/1655048.1655058 dblp:conf/drm/ZhangWTWC09 fatcat:lcjypl2objbhfm6cxojtt5b6oq

Watermarking Technique for HDL-based IP Module Protection

Min-Chuan Lin, Guo-Ruey Tsai, Chun-Rong Wu, Ching-Hui Lin
2007 Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)  
Reuse-based intellectual property (IP) design is one of the most promising techniques to take the SoC design quickly into market.  ...  For sequential logic system, we use RAM-based Finite State Machine (FSM) or Programmable Finite State Machine (PSM) to embed the personal watermark.  ...  The chance for success is very low. 5-2 Embedding Attacks (Forging) To change LUT table, one must take care of too many detail.  ... 
doi:10.1109/iih-msp.2007.326 dblp:conf/iih-msp/LinTWL07 fatcat:o6q2tbma5rdylbnqbrke6m7whu

A Review of Software Watermarking

Sarah H. Mnkash, Matheel E. Abdulmunem
2020 Iraqi Journal of Science  
Because the digital documents and objects can be easily replicated and distributed at an economically low cost and as the software is a type of digital object, the problem of software watermarking risen  ...  In this paper, the watermarked software will be explained in detail by defining the classification of watermarks software, models of attack, and methods used in software watermarking carried out by several  ...  analysed based on these attacks.  ... 
doi:10.24996/ijs.2020.61.10.30 fatcat:vvyy6vtlevgcvfc7apnyyznkkm

Deep Serial Number: Computational Watermarking for DNN Intellectual Property Protection [article]

Ruixiang Tang, Mengnan Du, Xia Hu
2020 arXiv   pre-print
However, the verification schemes of existing watermarking approaches are vulnerable to various watermark attacks.  ...  Motivated by the success of serial number in protecting conventional software IP, we introduce the first attempt to embed a serial number into DNNs.  ...  For trigger-based watermarking schemes, attackers are able to suppress the DNN model behaviors on the watermark trigger dataset to distort ownership verification [12, 17] .  ... 
arXiv:2011.08960v1 fatcat:uxy5lqegpvb75ms5rptwqmgjre

A Survey of Timing Channels and Countermeasures

Arnab Kumar Biswas, Dipak Ghosal, Shishir Nagaraja
2017 ACM Computing Surveys  
Based on the analysis of the current literature we articulate potential future research directions both in the design and applications of timing channels and their detection and prevention techniques.  ...  builds upon the last comprehensive survey by [Zander et al. 2007 ] and considers all the three canonical applications of timing channels namely, covert communication, timing side-channel, and network flow watermarking  ...  Branch predictor based timing channel. First branch prediction based software sidechannel attack is proposed in [Acimez et al. 2006 ].  ... 
doi:10.1145/3023872 fatcat:bj7jt5qwtbet3lzp5yghle4c3m

Software watermarking in the frequency domain: Implementation, analysis, and attacks

Christian Collberg, Tapas Ranjan Sahoo, Giampaolo Bella, Peter Ryan
2005 Journal of Computer Security  
We then present an empirical examination of the robustness of the watermark against a wide variety of attacks.  ...  Spreading the watermark over the code provides a high level of stealth and some manner of resilience against attack.  ...  This hierarchical clustering technique is based on a rule of "merging cost" and is a bottom-up approach.  ... 
doi:10.3233/jcs-2005-13503 fatcat:s7rgm4vba5gv5epa5d5g5rcj3q

Blind Digital Watermarking Framework Based on DTCWT and NSCT for Telemedicine Application

Nadhir Nouioua, Ali Seddiki, Abdelkrim Ghaz
2020 Traitement du signal  
In this work, a blind watermarking framework for medical images based on Dual-Tree Complex Wavelet Transform (DTCWT) and Non-subsampled Contourlet Transform (NSCT) is proposed.  ...  The core idea of this technique is to embed the watermark in the appropriate NSCT sub-band obtained by decomposing the cover image low coefficients purchased from the DTCWT standing on a quantization embedding  ...  Miscellaneous watermarking schemes exist, those schemes can be segmented into two groups Fragile watermarking and Robust watermarking, the first one operates directly on image pixels, where it can lead  ... 
doi:10.18280/ts.370608 fatcat:dgexr6dt6vb33ekuucm6c44sju

Sandmark - A tool for software protection research

C. Collberg, G. Myles, A. Huntwork
2003 IEEE Security and Privacy  
Given enough time and motivation, a competent attacker can subvert any software protection scheme. Most schemes therefore focus on making the cost of a successful attack as high as possible.  ...  Automated attack models assume that software protection schemes are attacked with tools that do not require user interaction.  ... 
doi:10.1109/msecp.2003.1219058 fatcat:k6o6x6xwhjaefgwcx54plb76tm

A novel watermarking method for software protection in the cloud

Zhiwei Yu, Chaokun Wang, Clark Thomborson, Jianmin Wang, Shiguo Lian, Athanasios V. Vasilakos
2011 Software, Practice & Experience  
We address this threat using software watermarking. We evaluate our access-control scheme within the context of a Collaboration Oriented Architecture, as defined by The Jericho Forum.  ...  As shown in Figure 9 , when watermarking 100 or fewer programs, using a single PC is faster than running a MapReduce watermarking process on our cloudlet. The cutover point is 200 programs  ...  We have identified a secondary-user threat to the security of these exchanges: Bob might redistribute the software for private gain or revenge.  ... 
doi:10.1002/spe.1088 fatcat:pw5l4ig7rvfrha5bz5qcr4czpa

Software watermarking

Christian Collberg, Clark Thomborson
1999 Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '99  
Finally, we propose a new software watermarking technique in which a dynamic graphic watermark is stored in the execution state of a program.  ...  Watermarking embeds a secret message into a cover message. In media watermarking the secret is usually a copyright notice and the cover a digital image.  ...  A similar signature property based on public-key cryptography has been proposed by Samson [33] for a static watermarking scheme.  ... 
doi:10.1145/292540.292569 dblp:conf/popl/CollbergT99 fatcat:t5oz5s43ybe7vgdwopjiy2inrm

Towards Better Software Tamper Resistance [chapter]

Hongxia Jin, Ginger Myles, Jeffery Lotspiech
2005 Lecture Notes in Computer Science  
Examples of such techniques include code obfuscation, software watermarking, and tamper detection.  ...  In this paper we propose a tamper resistance technique which provides both on and offline tamper detection.  ...  The majority of the space cost incurred by the branch-based scheme is based on the size of the integrity check branch functions and the displacement table.  ... 
doi:10.1007/11556992_30 fatcat:tn6epnbdxfeqdnjy3me2shc34i
« Previous Showing results 1 — 15 out of 433 results