Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
SmartMark: Software Watermarking Scheme for Smart Contracts
ICSE '23: Proceedings of the 45th International Conference on Software EngineeringPages 283–294https://doi.org/10.1109/ICSE48619.2023.00035A smart contract is a self-executing program on a blockchain to ensure an immutable and transparent agreement without the involvement of intermediaries. Despite its growing popularity for many blockchain platforms like Ethereum, no technical means is ...
- keynoteMarch 2018
Code Obfuscation: Why is This Still a Thing?
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 173–174https://doi.org/10.1145/3176258.3176342Early developments in code obfuscation were chiefly motivated by the needs of Digital Rights Management (DRM). Other suggested applications included intellectual property protection of software and code diversification to combat the monoculture problem ...
- research-articleOctober 2015
Encoding numbers into reducible permutation graphs using heap-ordered trees
PCI '15: Proceedings of the 19th Panhellenic Conference on InformaticsPages 311–316https://doi.org/10.1145/2801948.2801981Information hiding is widely used in almost all intelligence and security software systems as a standard technology to prevent piracy and copyright infringement. This technology mainly involves the idea of digital watermarking where a unique identifier (...
- research-articleApril 2015
Software Watermarking using Return-Oriented Programming
ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications SecurityPages 369–380https://doi.org/10.1145/2714576.2714582We propose a novel dynamic software watermarking design based on Return-Oriented Programming (ROP). Our design formats watermarking code into well-crafted data arrangements that look like normal data but could be triggered to execute. Once triggered, ...
- research-articleSeptember 2014
Droidmarking: resilient software watermarking for impeding android application repackaging
ASE '14: Proceedings of the 29th ACM/IEEE International Conference on Automated Software EngineeringPages 635–646https://doi.org/10.1145/2642937.2642977Software plagiarism in Android markets (app repackaging) is raising serious concerns about the health of the Android ecosystem. Existing app repackaging detection techniques fall short in detection efficiency and in resilience to circumventing attacks; ...
-
- research-articleSeptember 2013
Evaluating the WaterRpg software watermarking model on Java application programs
PCI '13: Proceedings of the 17th Panhellenic Conference on InformaticsPages 144–151https://doi.org/10.1145/2491845.2491873Recently, we have presented a dynamic watermarking model, which we named WaterRpg, for embedding a reducible permutation graph F[π*] into an application program P. The main idea behind the proposed watermarking model is to modify the dynamic call-graph ...
- research-articleJune 2013
Watermarking Java application programs using the WaterRpg dynamic model
CompSysTech '13: Proceedings of the 14th International Conference on Computer Systems and TechnologiesPages 291–298https://doi.org/10.1145/2516775.2516819We have recently presented an efficient codec system for encoding a watermark number w as a reducible permutation graph F [π*], through the use of self-inverting permutations π* and proposed a dynamic watermarking model, which we named WaterRpg, for ...
- ArticleJune 2013
An IPPCT Dynamic Watermarking Scheme Based on Chinese Remainder Theorem
ICCIS '13: Proceedings of the 2013 International Conference on Computational and Information SciencesPages 167–170https://doi.org/10.1109/ICCIS.2013.52This paper conducted a preliminary study and exploration of dynamic watermarking scheme. Firstly, the paper introduces software watermarking technology and analyses the process of dynamic graph watermarking. Secondly, this paper proposes and realizes ...
- research-articleMay 2013
AppInk: watermarking android apps for repackaging deterrence
ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications securityPages 1–12https://doi.org/10.1145/2484313.2484315With increased popularity and wide adoption of smartphones and mobile devices, recent years have seen a new burgeoning economy model centered around mobile apps. However, app repackaging, among many other threats, brings tremendous risk to the ecosystem,...
- research-articleMarch 2013
Protecting Android applications with steganography-based software watermarking
SAC '13: Proceedings of the 28th Annual ACM Symposium on Applied ComputingPages 1657–1658https://doi.org/10.1145/2480362.2480673In this paper, we propose a steganography-based software watermarking scheme to protect Android applications from software piracy. Considering the resource limitations in mobile devices, it is difficult to apply previous software watermarking schemes in ...
- research-articleMarch 2013
A novel watermarking method for Java programs
SAC '13: Proceedings of the 28th Annual ACM Symposium on Applied ComputingPages 1013–1018https://doi.org/10.1145/2480362.2480556Software piracy is one of the major concerns of programmers and software developers costing them huge amounts of financial losses every year. One of the programming languages used to develop software is Java. Although Java has some advantages over other ...
- ArticleNovember 2012
An Improved Dynamic Graph Watermark Algorithm
MINES '12: Proceedings of the 2012 Fourth International Conference on Multimedia Information Networking and SecurityPages 568–571https://doi.org/10.1109/MINES.2012.65By studying the characteristic of traditional graph encoding, we found two critical shortages: the first is that graph encoding efficiency is lower, the second is that graph topology is independent from the host which means all the graph encodings are ...
- research-articleOctober 2012
A robust steganography-based software watermarking
RACS '12: Proceedings of the 2012 ACM Research in Applied Computation SymposiumPages 333–337https://doi.org/10.1145/2401603.2401675Software watermarking is widely used to protect intellectual property owners of software from piracy. However, existing proposed schemes have shortcomings such that the watermarks can be defeated by semantics-preserving code transformations such as code ...
- ArticleJuly 2012
An Embedding Graph-based Model for Software Watermarking
IIH-MSP '12: Proceedings of the 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal ProcessingPages 261–264https://doi.org/10.1109/IIH-MSP.2012.69In a software watermarking environment, several graph theoretic watermark methods encode the watermark values as graph structures and embed them in application programs. In this paper we first present an efficient codec system for encoding a watermark ...
- ArticleJuly 2012
An Efficient Graph Codec System for Software Watermarking
COMPSACW '12: Proceedings of the 2012 IEEE 36th Annual Computer Software and Applications Conference WorkshopsPages 595–600https://doi.org/10.1109/COMPSACW.2012.116In this paper we propose an efficient and easily implemented codec system for encoding watermark numbers as reducible permutation flow-graphs. More precisely, in light of our recent encoding algorithms which encode a watermark value $w$ as a self-...
- research-articleJune 2012
Multiple encoding of a watermark number into reducible permutation graphs using cotrees
CompSysTech '12: Proceedings of the 13th International Conference on Computer Systems and TechnologiesPages 118–125https://doi.org/10.1145/2383276.2383295Software watermarking involves embedding a unique identifier, i.e., a watermark value, within a software to discourage software theft; to this end, several graph theoretic watermark methods encode the watermark values as graph structures and embed them ...
- research-articleMay 2012
On the (im)possibility of obfuscating programs
Journal of the ACM (JACM), Volume 59, Issue 2Article No.: 6, Pages 1–48https://doi.org/10.1145/2160158.2160159Informally, an obfuscator O is an (efficient, probabilistic) “compiler” that takes as input a program (or circuit) P and produces a new program O(P) that has the same functionality as P yet is “unintelligible” in some sense. Obfuscators, if they exist, ...
- research-articleJune 2011
Encoding watermark numbers as cographs using self-inverting permutations
CompSysTech '11: Proceedings of the 12th International Conference on Computer Systems and TechnologiesPages 142–148https://doi.org/10.1145/2023607.2023632In a software watermarking environment, several graph theoretic watermark methods encode the watermark values as graph structures and embed them in application programs. In this paper we extended the class of graphs which can be efficiently used in a ...
- ArticleNovember 2010
Robust Software Watermarking Scheme Based on Obfuscated Interpretation
MINES '10: Proceedings of the 2010 International Conference on Multimedia Information Networking and SecurityPages 671–675https://doi.org/10.1109/MINES.2010.146A robust software watermarking scheme under which the watermark can resist against various attacks includ-ing collusion attacks is proposed based on obfuscated interpretation. The obfuscated interpretation technique can not only hide the functionality ...
- research-articleSeptember 2010
Trusted Cloud Computing with Secure Resources and Data Coloring
IEEE Internet Computing (IEEECS_INTERNET), Volume 14, Issue 5Pages 14–22https://doi.org/10.1109/MIC.2010.86Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized data-center resources, uphold user privacy, and preserve data integrity. The authors suggest using a trust-...