Robust Software Watermarking Scheme Based on Obfuscated Interpretation

A robust software watermarking scheme under which the watermark can resist against various attacks includ-ing collusion attacks is proposed based on obfuscated interpretation. The obfuscated interpretation technique can not only hide the functionality of a given program, but also provide an alternative simple way to modify the code. Thus in the proposed scheme translation rules defined in obfuscated interpretation are used for code substitution, and a water-mark encoded by error-correcting coding is embedded during the translation procedure of obfuscated interpretation. A series of experimental results show that the proposed watermark can resist against automatic attacks that modify the program code. Moreover due to the randomness introduced in the program translation, the watermark is robust to collusion attacks as well.

[1]  Christian S. Collberg,et al.  Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks , 2004, Information Hiding.

[2]  Ramarathnam Venkatesan,et al.  A Graph Theoretic Approach to Software Watermarking , 2001, Information Hiding.

[3]  Gael Hachez,et al.  A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards , 2003 .

[4]  Michael Stepp,et al.  More on graph theoretic software watermarks: Implementation, analysis, and attacks , 2009, Inf. Softw. Technol..

[5]  Christian S. Collberg,et al.  Dynamic graph-based software fingerprinting , 2007, TOPL.

[6]  Christian S. Collberg,et al.  Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..

[7]  Jean-Jacques Quisquater,et al.  Robust Object Watermarking: Application to Code , 1999, Information Hiding.

[8]  Ibrahim Kamel,et al.  A robust software watermarking for copyright protection , 2009, Comput. Secur..

[9]  Patrick Cousot,et al.  An abstract interpretation-based framework for software watermarking , 2004, POPL.

[10]  Wanli Zuo,et al.  A Framework for Mobile Phone Java Software Protection , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[11]  Christian S. Collberg,et al.  Software watermarking: models and dynamic embeddings , 1999, POPL '99.

[12]  Christian S. Collberg,et al.  Software watermarking in the frequency domain: Implementation, analysis, and attacks , 2005, J. Comput. Secur..

[13]  Akito Monden,et al.  A Framework for Obfuscated Interpretation , 2004, ACSW.

[14]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..