Watermarking, tamper-proofing, and obfuscation - Tools for software protection

Christian S Collberg, Clark Thomborson

Research output: Contribution to journalArticle

449 Citations (Scopus)

Abstract

We identify three types of attack on the intellectual property contained in software and three corresponding technical defenses. A defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense against tampering is tamper-proofing, so that unauthorized modifications to software (for example, to remove a watermark) will result in nonfunctional code. We briefly survey the available technology for each type of defense.

Original languageEnglish (US)
Pages (from-to)735-746
Number of pages12
JournalIEEE Transactions on Software Engineering
Volume28
Issue number8
DOIs
StatePublished - Aug 2002

Fingerprint

Computer crime
Reverse engineering
Intellectual property
Watermarking

Keywords

  • Intellectual property protection
  • Obfuscation
  • Tamper-proofing
  • Watermarking

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Software
  • Electrical and Electronic Engineering

Cite this

Watermarking, tamper-proofing, and obfuscation - Tools for software protection. / Collberg, Christian S; Thomborson, Clark.

In: IEEE Transactions on Software Engineering, Vol. 28, No. 8, 08.2002, p. 735-746.

Research output: Contribution to journalArticle

@article{d36a2d238dac4ab380712cf4bc8362e4,
title = "Watermarking, tamper-proofing, and obfuscation - Tools for software protection",
abstract = "We identify three types of attack on the intellectual property contained in software and three corresponding technical defenses. A defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense against tampering is tamper-proofing, so that unauthorized modifications to software (for example, to remove a watermark) will result in nonfunctional code. We briefly survey the available technology for each type of defense.",
keywords = "Intellectual property protection, Obfuscation, Tamper-proofing, Watermarking",
author = "Collberg, {Christian S} and Clark Thomborson",
year = "2002",
month = "8",
doi = "10.1109/TSE.2002.1027797",
language = "English (US)",
volume = "28",
pages = "735--746",
journal = "IEEE Transactions on Software Engineering",
issn = "0098-5589",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "8",

}

TY - JOUR

T1 - Watermarking, tamper-proofing, and obfuscation - Tools for software protection

AU - Collberg, Christian S

AU - Thomborson, Clark

PY - 2002/8

Y1 - 2002/8

N2 - We identify three types of attack on the intellectual property contained in software and three corresponding technical defenses. A defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense against tampering is tamper-proofing, so that unauthorized modifications to software (for example, to remove a watermark) will result in nonfunctional code. We briefly survey the available technology for each type of defense.

AB - We identify three types of attack on the intellectual property contained in software and three corresponding technical defenses. A defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense against tampering is tamper-proofing, so that unauthorized modifications to software (for example, to remove a watermark) will result in nonfunctional code. We briefly survey the available technology for each type of defense.

KW - Intellectual property protection

KW - Obfuscation

KW - Tamper-proofing

KW - Watermarking

UR - http://www.scopus.com/inward/record.url?scp=0036704573&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0036704573&partnerID=8YFLogxK

U2 - 10.1109/TSE.2002.1027797

DO - 10.1109/TSE.2002.1027797

M3 - Article

AN - SCOPUS:0036704573

VL - 28

SP - 735

EP - 746

JO - IEEE Transactions on Software Engineering

JF - IEEE Transactions on Software Engineering

SN - 0098-5589

IS - 8

ER -