Abstract
This paper presents an implementation of the watermarking method proposed by Venkatesan et al. in their paper [R. Venkatesan, V. Vazirani, S. Sinha, A graph theoretic approach to software watermarking, in: Fourth International Information Hiding Workshop, Pittsburgh, PA, 2001]. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We present two algorithms for splitting a watermark number into a redundant set of pieces and an algorithm for turning a watermark number into a control-flow graph. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks.
Original language | English (US) |
---|---|
Pages (from-to) | 56-67 |
Number of pages | 12 |
Journal | Information and Software Technology |
Volume | 51 |
Issue number | 1 |
DOIs | |
State | Published - Jan 2009 |
Keywords
- Software piracy protection
- Software protection
- Software watermarking
- Surreptitious software
ASJC Scopus subject areas
- Software
- Information Systems
- Computer Science Applications