Sciweavers

ECR
2006

Software watermarking via opaque predicates: Implementation, analysis, and attacks

13 years 3 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on how a software watermark is applied it can be used to discourage piracy; as proof of authorship or purchase; or to track the source of the illegal redistribution. In particular we analyze an algorithm originally proposed by Genevi`eve Arboit in A Method for Watermarking Java Programs via Opaque Predicates. This watermarking technique embeds the watermark by adding opaque predicates to the application. We have found that the Arboit technique does withstand some forms of attack and has a respectable data-rate. However, it is susceptible to a variety of distortive attacks. One unanswered question in the area of software watermarking is whether dynamic algorithms are inherently more resilient to attacks than static algorithms. We have implemented and empirically evaluated both static and dynamic versions within the...
Ginger Myles, Christian S. Collberg
Added 12 Dec 2010
Updated 12 Dec 2010
Type Journal
Year 2006
Where ECR
Authors Ginger Myles, Christian S. Collberg
Comments (0)