Affiliation:
1. University of Arizona, Tucson, AZ
2. University of Auckland, Auckland, New Zealand
Abstract
Fingerprinting embeds a secret message into a cover message. In media fingerprinting, the secret is usually a copyright notice and the cover a digital image. Fingerprinting an object discourages intellectual property theft, or when such theft has occurred, allows us to prove ownership.
The Software Fingerprinting problem can be described as follows. Embed a structure
W
into a program
P
such that:
W
can be reliably located and extracted from
P
even after
P
has been subjected to code transformations such as translation, optimization and obfuscation;
W
is stealthy;
W
has a high data rate; embedding
W
into
P
does not adversely affect the performance of
P
; and
W
has a mathematical property that allows us to argue that its presence in
P
is the result of deliberate actions.
In this article, we describe a software fingerprinting technique in which a dynamic graph fingerprint is stored in the execution state of a program. Because of the hardness of pointer alias analysis such fingerprints are difficult to attack automatically.
Publisher
Association for Computing Machinery (ACM)
Reference66 articles.
1. BCEL. 2004. jakarta.apache.org/bcel. BCEL. 2004. jakarta.apache.org/bcel.
2. DynamicJava. 2004. koala.ilog.fr/djava. DynamicJava. 2004. koala.ilog.fr/djava.
3. Ahpah. 2005. Sourceagain. ahpah.com. Ahpah. 2005. Sourceagain. ahpah.com.
4. Combatting Software Piracy by Encryption and Key Management
5. On the limits of steganography
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献