Graph Theoretic Software Watermarks

Implementation, Analysis, and Attacks

Christian S Collberg, Andrew Huntwork, Edward Carter, Gregg Townsend

Research output: Contribution to journalArticle

16 Citations (Scopus)

Abstract

This paper presents an implementation of the novel watermarking method proposed by Venkatcsan, Vazirani, and Sinha in their recent paper A Graph Theoretic Approach to Software Watermarking. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks.

Original languageEnglish (US)
Pages (from-to)192-207
Number of pages16
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3200
StatePublished - 2004

Fingerprint

Watermark
Watermarking
Software
Attack
Graph in graph theory
Flow graphs
Flow Graphs
Java
Topology
Evaluate

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

@article{e8f5b5c846cf4e7eafed56b9c0fd7ce8,
title = "Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks",
abstract = "This paper presents an implementation of the novel watermarking method proposed by Venkatcsan, Vazirani, and Sinha in their recent paper A Graph Theoretic Approach to Software Watermarking. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks.",
author = "Collberg, {Christian S} and Andrew Huntwork and Edward Carter and Gregg Townsend",
year = "2004",
language = "English (US)",
volume = "3200",
pages = "192--207",
journal = "Lecture Notes in Computer Science",
issn = "0302-9743",
publisher = "Springer Verlag",

}

TY - JOUR

T1 - Graph Theoretic Software Watermarks

T2 - Implementation, Analysis, and Attacks

AU - Collberg, Christian S

AU - Huntwork, Andrew

AU - Carter, Edward

AU - Townsend, Gregg

PY - 2004

Y1 - 2004

N2 - This paper presents an implementation of the novel watermarking method proposed by Venkatcsan, Vazirani, and Sinha in their recent paper A Graph Theoretic Approach to Software Watermarking. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks.

AB - This paper presents an implementation of the novel watermarking method proposed by Venkatcsan, Vazirani, and Sinha in their recent paper A Graph Theoretic Approach to Software Watermarking. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks.

UR - http://www.scopus.com/inward/record.url?scp=28844456618&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=28844456618&partnerID=8YFLogxK

M3 - Article

VL - 3200

SP - 192

EP - 207

JO - Lecture Notes in Computer Science

JF - Lecture Notes in Computer Science

SN - 0302-9743

ER -