Affiliation:
1. Siberian State University of Telecommunications and Information Science (SibSUTIS)
Abstract
A method for identifying a program copy by means of digital watermark is presented in this article. Previously known analogues for constructing a watermark used modification of program's control flow graph, and reading was made via complex analysis of the program's trace. It is known that applying a protector or packer can neutralize such a watermark. In this paper, it is proposed to use a multi-threaded application that generates numbers with a normal distribution law. The embedding of the digital watermark is carried out by changing the dispersion of distributions. Such random variable can be found via a signature in the process memory and is used both within the program itself and by a third-party when reading the watermark. An experimental selection of the optimal parameters of the algorithm has been carried out. Overhead expenses associated with the creation of a large number of threads are estimated.
Publisher
Siberian State University of Telecommunications and Informatics
Reference12 articles.
1. Jung J. H., Kim J. Y., Lee H. C., Yi J. H. Repackaging attack on android banking applications and its countermeasures. Wireless Personal Communications, 2013, vol. 73, pp. 1421-1437.
2. Balakrishnan A., Schulze C. Code obfuscation literature survey. CS701 Construction of compilers, 2005, vol. 19, pp. 31.
3. Thomborson C., Nagra J., Somaraju R., He C. Tamper-proofing software watermarks. Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation, 2004, vol. 32, pp. 27-36.
4. Collberg C., Thomborson C. Software watermarking: Models and dynamic embeddings. Proc. of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, 1999, pp. 311-324.
5. Hamilton J., Danicic S. A survey of static software watermarking. IEEE World Congress on Internet Security (WorldCIS-2011), 2011, pp. 100-107.