The evaluation of two software watermarking algorithms

Ginger Myles, Christian S Collberg, Zachary Heidepriem, Armand Navabi

Research output: Contribution to journalArticle

9 Citations (Scopus)

Abstract

In this paper we analyze the effectiveness of two different software watermarking algorithms. The first is an algorithm proposed by Akito Monden et al. and the second an algorithm proposed by Robert L. Davidson and Nathan Myhrvold of the Microsoft Corporation. We have implemented these techniques within the SANDMARK framework, a system designed to study the effectiveness of software protection algorithms on Java bytecode. To the best of our knowledge this is the first implementation and empirical evaluation of these algorithms with respect to a set of properties such as bit-rate, stealth, and resilience to attack. We demonstrate through the use of the SANDMARK framework that both of these algorithms have a high bit-rate but are unstealthy and easy to attack.

Original languageEnglish (US)
Pages (from-to)923-938
Number of pages16
JournalSoftware - Practice and Experience
Volume35
Issue number10
DOIs
StatePublished - Aug 2005

Fingerprint

Watermarking
Industry

Keywords

  • Copyright protection
  • Software piracy
  • Software watermarking

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Software

Cite this

The evaluation of two software watermarking algorithms. / Myles, Ginger; Collberg, Christian S; Heidepriem, Zachary; Navabi, Armand.

In: Software - Practice and Experience, Vol. 35, No. 10, 08.2005, p. 923-938.

Research output: Contribution to journalArticle

Myles, Ginger ; Collberg, Christian S ; Heidepriem, Zachary ; Navabi, Armand. / The evaluation of two software watermarking algorithms. In: Software - Practice and Experience. 2005 ; Vol. 35, No. 10. pp. 923-938.
@article{598c7ec33f3644c1ba83c81b319542a1,
title = "The evaluation of two software watermarking algorithms",
abstract = "In this paper we analyze the effectiveness of two different software watermarking algorithms. The first is an algorithm proposed by Akito Monden et al. and the second an algorithm proposed by Robert L. Davidson and Nathan Myhrvold of the Microsoft Corporation. We have implemented these techniques within the SANDMARK framework, a system designed to study the effectiveness of software protection algorithms on Java bytecode. To the best of our knowledge this is the first implementation and empirical evaluation of these algorithms with respect to a set of properties such as bit-rate, stealth, and resilience to attack. We demonstrate through the use of the SANDMARK framework that both of these algorithms have a high bit-rate but are unstealthy and easy to attack.",
keywords = "Copyright protection, Software piracy, Software watermarking",
author = "Ginger Myles and Collberg, {Christian S} and Zachary Heidepriem and Armand Navabi",
year = "2005",
month = "8",
doi = "10.1002/spe.657",
language = "English (US)",
volume = "35",
pages = "923--938",
journal = "Software - Practice and Experience",
issn = "0038-0644",
publisher = "John Wiley and Sons Ltd",
number = "10",

}

TY - JOUR

T1 - The evaluation of two software watermarking algorithms

AU - Myles, Ginger

AU - Collberg, Christian S

AU - Heidepriem, Zachary

AU - Navabi, Armand

PY - 2005/8

Y1 - 2005/8

N2 - In this paper we analyze the effectiveness of two different software watermarking algorithms. The first is an algorithm proposed by Akito Monden et al. and the second an algorithm proposed by Robert L. Davidson and Nathan Myhrvold of the Microsoft Corporation. We have implemented these techniques within the SANDMARK framework, a system designed to study the effectiveness of software protection algorithms on Java bytecode. To the best of our knowledge this is the first implementation and empirical evaluation of these algorithms with respect to a set of properties such as bit-rate, stealth, and resilience to attack. We demonstrate through the use of the SANDMARK framework that both of these algorithms have a high bit-rate but are unstealthy and easy to attack.

AB - In this paper we analyze the effectiveness of two different software watermarking algorithms. The first is an algorithm proposed by Akito Monden et al. and the second an algorithm proposed by Robert L. Davidson and Nathan Myhrvold of the Microsoft Corporation. We have implemented these techniques within the SANDMARK framework, a system designed to study the effectiveness of software protection algorithms on Java bytecode. To the best of our knowledge this is the first implementation and empirical evaluation of these algorithms with respect to a set of properties such as bit-rate, stealth, and resilience to attack. We demonstrate through the use of the SANDMARK framework that both of these algorithms have a high bit-rate but are unstealthy and easy to attack.

KW - Copyright protection

KW - Software piracy

KW - Software watermarking

UR - http://www.scopus.com/inward/record.url?scp=23744450258&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=23744450258&partnerID=8YFLogxK

U2 - 10.1002/spe.657

DO - 10.1002/spe.657

M3 - Article

AN - SCOPUS:23744450258

VL - 35

SP - 923

EP - 938

JO - Software - Practice and Experience

JF - Software - Practice and Experience

SN - 0038-0644

IS - 10

ER -