Article

Article title DIGITAL WATERMARKS FOR C/C++ PROGRAMS
Authors I.V. Nechta, A.N. Fionov
Section SECTION IV. METHODS AND MEANS OF CRYPTOGRAPHY AND STEGANOGRAPHY
Month, Year 11, 2010 @en
Index UDC 003.26
DOI
Abstract The results of the first stage of the project devoted to development of watermarking system for C/C++ programs are presented. Watermarks are embedded by making slight equivalent variations of program’s source codes. It is supposed that such watermarks will be robust with respect to attacks on binary executable files when the adversary has no access to their source codes. The rate of embedding for typical Symbian applications is experimentally obtained. Remaining problems and directions of future research are discussed.

Download PDF

Keywords Digital watermarks; software steganography; Symbian; ARM.
References 1. Davidson R.L., Myhrvold N. Method and system for generating and auditing a signature for a computer program // US Patent 5559884. – 1996.
2. Collberg C., Thomborson C. Software watermarking: Models and dynamic embeddings // Annual Symposium «Principles of Programming Languages». – San Antonio: ACM Press, 1999. – P. 311-324.
3. Stern J., Hachez G., Koeune F., Quisquater J. Robust object watermarking: Application to code // III International Workshop «Information Hiding 1999». Vol. 1768. – Berlin: Springer, 1999. – P. 368-378.
4. Venkatesan R., Vazirani V., Sinha S. A graph theoretic approach to software watermarking // IV International Workshop «Information Hiding 2001». V. 2137. – Pittsburgh: Springer, 2001. – P. 157-168.
5. Collberg C., Thomborson C., Townsend G. Dynamic graph-based software watermarking // Technical report, Dept. of Computer Science. – Univ. of Arizona. – 2004.
6. Curran D., Cinneide M.O., Hurley N., Silvestre G. Dependency in software watermarking // I International Conference «Information and Communication Technologies: from Theory to Applications». – Damascus, 2004. – P. 569-570.
7. Sahoo T.R., Collberg C. Software watermarking in the frequency domain: Implementation, analysis, and attacks // Technical report, Dept. of Computer Science. – Univ. of Arizona. – 2004.
8. El-Khalil R., Keromytis A. Hydan: hiding information in program binaries // VI International Conference «Information and Communications Security». V. 3269. – Berlin: Springer, 2004. – P. 187-199.
9. Anckaert B., De Sutter B., Chanet D., De Bosschere K. Steganography for executables and code transformation signatures // VII International Conference «Information Security and Cryptology».V. 3506. – Seoul: Springer, 2005. – P. 431-445.
10. Nechta I., Ryabko B., Fionov A. Stealthy steganographic methods for executable files // XII International Symposium «Problems of Redundancy». – St.-Petersburg, 2009 . – P. 191-195.

Comments are closed.