TY - JOUR
T1 - Graph Theoretic Software Watermarks
T2 - Implementation, Analysis, and Attacks
AU - Collberg, Christian
AU - Huntwork, Andrew
AU - Carter, Edward
AU - Townsend, Gregg
PY - 2004
Y1 - 2004
N2 - This paper presents an implementation of the novel watermarking method proposed by Venkatcsan, Vazirani, and Sinha in their recent paper A Graph Theoretic Approach to Software Watermarking. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks.
AB - This paper presents an implementation of the novel watermarking method proposed by Venkatcsan, Vazirani, and Sinha in their recent paper A Graph Theoretic Approach to Software Watermarking. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks.
UR - https://www.scopus.com/pages/publications/28844456618
UR - https://www.scopus.com/pages/publications/28844456618#tab=citedBy
U2 - 10.1007/978-3-540-30114-1_14
DO - 10.1007/978-3-540-30114-1_14
M3 - Article
AN - SCOPUS:28844456618
SN - 0302-9743
VL - 3200
SP - 192
EP - 207
JO - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
JF - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ER -