Abstract
We describe a dynamic software watermark embedded in the memory trace of an executing Java program. Our approach is a generalisation of the spread–transform watermarking technique developed for use in the multimedia domain. We show how the spread–transform paradigm enables the embedding of dither modulation watermarks in a Java program and report its robustness to realistic additive noise attacks.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. In: ISIT: Proceedings IEEE International Symposium on Information Theory, sponsored by The Information Theory Society of The Institute of Electrical and Electronic Engineers, May 2000, vol. 47, pp. 1424–1443 (2000)
Collberg, C.S.: SandMark User’s Guide (January 2003), http://www.cs.arizona.edu/sandmark
Collberg, C.S., Thomborson, C.D.: Software Watermarking: Models and Dynamic Embeddings. In: Principles of Programming Languages 1999 (POPL 1999), pp. 311–324 (January 1999)
Collberg, C.S., Thomborson, C.D., Low, D.: A Taxonomy of Obfuscating Transformations. Technical Report TR98–148, Department of Computer Science, The University of Auckland (July 1997)
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: A Secure, Robust Watermark for Multimedia. In: Workshop on Information Hiding, pp. 175–190 (May 1996)
Curran, D.M., Hurley, N.J., Cinnéide, M.Ó.: Securing Java Through Software Watermarking. In: Principles and Practice of Programming in Java (PPPJ 2003) (June 2003)
Hachez, G.: A Comparative Study of Software Protection Tools Suited for E–Commerce with Contributions to Software Watermarking and Smart Cards. PhD thesis, Universite Catholique de Louvain (March 2003)
Argonne National Laboratory. NEOS Optimization Server, http://www-neos.mcs.anl.gov/neos
Liang, S., Viswanathan, D.: Comprehensive Profiling Support in the Java Virtual Machine. In: 5th USENIX Conference on Object–Oriented Technologies and Systems (COOTS 1999) (May 1999)
Maña, A., Pimentel, E.: An Efficient Software Protection Scheme. In: Dupuy, M., Paradinas, P. (eds.) IFIP Conference Proceedings Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP 2001), vol. 193, pp. 385–402. Kluwer, Dordrecht (2001)
Sun Microsystems. Java Virtual Machine, http://java.sun.com
Miller, M., Cox, I.J., Linnartz, J.P., Kalker, T.: A Review of Watermarking Principles and Practices. Digital Signal Processing in Multimedia Systems (1999)
Dash Optimization. Xpress–MP, http://www.dashoptimization.com
Peticolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding — A Survey. In: Proceedings of the IEEE, vol. 87, pp. 1062–1078 (July 1999)
Sahoo, T., Collberg, C.: Software Watermarking in the Frequency Domain: Implementation, Analysis, and Attacks. Technical Report TR04–07, Department of Computer Science, The University of Arizona (March 2004)
Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.-J.: Robust Object Watermarking: Application to Code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 368–378. Springer, Heidelberg (2000)
UCLA Compilers Group. Java Tree Builder, compilers.cs.ucla.edu/jtb
Venkatesan, R., Vazirani, V., Sinha, S.: A Graph Theoretic Approach to Software Watermarking. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 157–168. Springer, Heidelberg (2001)
Zhang, X., Gupta, R.: Hiding Program Slices for Software Security. In: International Symposium on Code Generation and Optimization (CGO 2003), p. 325 (March 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Larkin, A.J., Balado, F., Hurley, N.J., Silvestre, G.C.M. (2005). Dither Modulation Watermarking of Dynamic Memory Traces. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds) Information Hiding. IH 2005. Lecture Notes in Computer Science, vol 3727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558859_27
Download citation
DOI: https://doi.org/10.1007/11558859_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29039-1
Online ISBN: 978-3-540-31481-3
eBook Packages: Computer ScienceComputer Science (R0)