Watermarking, tamper-proofing, and obfuscation-tools for software protection

ثبت نشده
چکیده

component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection

We identify three types of attack on the intellectual property contained in software, and three corresponding technical defenses. A potent defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense agains...

متن کامل

Intellectual Property Right Protection of Browser based Software through Watermarking Technique

With the explosive growth of internet technology, many innovative web applications have been launched. For designing web applications Java has become a very popular programming language. Java bytecode technique makes it with high portability. However, it also poses large dangers to malicious users. Many techniques have been proposed for software copyright protection. They are useful for stand-a...

متن کامل

Software watermarking in the frequency domain: Implementation, analysis, and attacks

In this paper we analyze the SHKQ software watermarking algorithm, originally due to Stern, Hachez, Koeune and Quisquater. The algorithm has been implemented within the SandMark framework, a system designed to allow effective study of software protection algorithms (such as code obfuscation, software watermarking, and code tamper-proofing) targeting Java bytecode. The SHKQ algorithm embeds a wa...

متن کامل

Evaluating Effectiveness of Tamper Proofing on Dynamic Graph Software Watermarks

For enhancing the protection level of dynamic graph software watermarks and for the purpose of conducting the analysis which evaluates the effect of integrating two software protection techniques such as software watermarking and tamper-proofing, constant encoding technique along with the enhancement through the idea of constant splitting is proposed. In this paper Thomborson technique has been...

متن کامل

A Relational Model for Software Protection Metrics

Software obfuscation and tamper-proofing algorithms have been widely deployed to protect the intellectual property associated with distributed software and to guard against unintended usage. It has been found that these algorithms tend to make programs larger, slower and raise caching concerns. This paper addresses the relative performance aspects of a few popular software protection algorithms...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000