Hiding Signatures in Variable Names

With the development of software technology, the copyright of the software is increasingly important. One aspect is the copyright of the source code. This paper proposed a new algorithm named HSVN (hiding signatures in variable names) to hide the copyright signature or watermark in the source code. It belongs to the static watermark. The basic idea of HSVN algorithm is adding signature bytes into the variable names which are located by random sequence, and the difference between the alongside two chars of the specific variable name is the hidden signature byte. HSVN Algorithm can hide the signature more easily and more invisibly. Moreover, it can hide a large amount of information with little redundancy added to the program.

[1]  Andrew C. Myers,et al.  Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[2]  Christian S. Collberg,et al.  Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks , 2004, Information Hiding.

[3]  M. Shirali-Shahreza,et al.  Software Watermarking by Equation Reordering , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.

[4]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[5]  Christian S. Collberg,et al.  On the Limits of Software Watermarking , 1998 .

[6]  Christian S. Collberg,et al.  Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..

[7]  Stavros D. Nikolopoulos,et al.  Encoding watermark numbers as cographs using self-inverting permutations , 2011, CompSysTech '11.

[8]  Gang Qu,et al.  Analysis of watermarking techniques for graph coloring problem , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).

[9]  Wang Ying,et al.  A strategy of software protection based on multi-watermarking embedding , 2011, 2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA).

[10]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[11]  Jongin Lim,et al.  Information Security and Cryptology - ICISC 2003 , 2003, Lecture Notes in Computer Science.

[12]  Christian S. Collberg,et al.  Software watermarking: models and dynamic embeddings , 1999, POPL '99.

[13]  Jianmin Wang,et al.  A Software Watermark Based Architecture for Cloud Security , 2012, APWeb.

[14]  Christian S. Collberg,et al.  Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks , 2003, ICISC.

[15]  Sebastian Danicic,et al.  A survey of static software watermarking , 2011, 2011 World Congress on Internet Security (WorldCIS-2011).

[16]  Ramarathnam Venkatesan,et al.  A Graph Theoretic Approach to Software Watermarking , 2001, Information Hiding.

[17]  Kyuseok Shim,et al.  Web Technologies and Applications , 2014, Lecture Notes in Computer Science.