کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
552017 873160 2009 12 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
More on graph theoretic software watermarks: Implementation, analysis, and attacks
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر تعامل انسان و کامپیوتر
پیش نمایش صفحه اول مقاله
More on graph theoretic software watermarks: Implementation, analysis, and attacks
چکیده انگلیسی

This paper presents an implementation of the watermarking method proposed by Venkatesan et al. in their paper [R. Venkatesan, V. Vazirani, S. Sinha, A graph theoretic approach to software watermarking, in: Fourth International Information Hiding Workshop, Pittsburgh, PA, 2001]. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We present two algorithms for splitting a watermark number into a redundant set of pieces and an algorithm for turning a watermark number into a control-flow graph. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Information and Software Technology - Volume 51, Issue 1, January 2009, Pages 56–67
نویسندگان
, , , , ,