Sandmark - A tool for software protection research

Christian S Collberg, Ginger Myles, Andrew Huntwork

Research output: Contribution to journalArticle

82 Citations (Scopus)

Abstract

The effectiveness of software-based methods for software protection from piracy, tampering and reverse engineering by Sandmark tool is discussed. The Sandmark framework is designed for implementation and evaluation of software-based techniques such as software watermarking and code obfuscation. The control flow analysis is used in several Sandmark algorithms in which it is more natural to modify control-flow graph method than its instruction list representation. The aim of Sandmark watermarking module is to develop techniques which determine embedding and recognition algorithms having smallest performance overhead and highest resilence attacks.

Original languageEnglish (US)
Pages (from-to)40-49
Number of pages10
JournalIEEE Security and Privacy
Volume1
Issue number4
DOIs
StatePublished - Jul 2003

Fingerprint

Watermarking
Flow graphs
Reverse engineering
Flow control
piracy
engineering
instruction
software
evaluation
performance

ASJC Scopus subject areas

  • Engineering(all)
  • Computer Networks and Communications

Cite this

Sandmark - A tool for software protection research. / Collberg, Christian S; Myles, Ginger; Huntwork, Andrew.

In: IEEE Security and Privacy, Vol. 1, No. 4, 07.2003, p. 40-49.

Research output: Contribution to journalArticle

Collberg, Christian S ; Myles, Ginger ; Huntwork, Andrew. / Sandmark - A tool for software protection research. In: IEEE Security and Privacy. 2003 ; Vol. 1, No. 4. pp. 40-49.
@article{93db5df173134ff98920d8eea2d4a819,
title = "Sandmark - A tool for software protection research",
abstract = "The effectiveness of software-based methods for software protection from piracy, tampering and reverse engineering by Sandmark tool is discussed. The Sandmark framework is designed for implementation and evaluation of software-based techniques such as software watermarking and code obfuscation. The control flow analysis is used in several Sandmark algorithms in which it is more natural to modify control-flow graph method than its instruction list representation. The aim of Sandmark watermarking module is to develop techniques which determine embedding and recognition algorithms having smallest performance overhead and highest resilence attacks.",
author = "Collberg, {Christian S} and Ginger Myles and Andrew Huntwork",
year = "2003",
month = "7",
doi = "10.1109/MSECP.2003.1219058",
language = "English (US)",
volume = "1",
pages = "40--49",
journal = "IEEE Security and Privacy",
issn = "1540-7993",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "4",

}

TY - JOUR

T1 - Sandmark - A tool for software protection research

AU - Collberg, Christian S

AU - Myles, Ginger

AU - Huntwork, Andrew

PY - 2003/7

Y1 - 2003/7

N2 - The effectiveness of software-based methods for software protection from piracy, tampering and reverse engineering by Sandmark tool is discussed. The Sandmark framework is designed for implementation and evaluation of software-based techniques such as software watermarking and code obfuscation. The control flow analysis is used in several Sandmark algorithms in which it is more natural to modify control-flow graph method than its instruction list representation. The aim of Sandmark watermarking module is to develop techniques which determine embedding and recognition algorithms having smallest performance overhead and highest resilence attacks.

AB - The effectiveness of software-based methods for software protection from piracy, tampering and reverse engineering by Sandmark tool is discussed. The Sandmark framework is designed for implementation and evaluation of software-based techniques such as software watermarking and code obfuscation. The control flow analysis is used in several Sandmark algorithms in which it is more natural to modify control-flow graph method than its instruction list representation. The aim of Sandmark watermarking module is to develop techniques which determine embedding and recognition algorithms having smallest performance overhead and highest resilence attacks.

UR - http://www.scopus.com/inward/record.url?scp=3042819306&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=3042819306&partnerID=8YFLogxK

U2 - 10.1109/MSECP.2003.1219058

DO - 10.1109/MSECP.2003.1219058

M3 - Article

AN - SCOPUS:3042819306

VL - 1

SP - 40

EP - 49

JO - IEEE Security and Privacy

JF - IEEE Security and Privacy

SN - 1540-7993

IS - 4

ER -