Abstract
With the development of software technology, the copyright of the software is increasingly important. One aspect is the copyright of the source code. This paper proposed a new algorithm named HSVN (hiding signatures in variable names) to hide the copyright signature or watermark in the source code. It belongs to the static watermark. The basic idea of HSVN algorithm is adding signature bytes into the variable names which are located by random sequence, and the difference between the alongside two chars of the specific variable name is the hidden signature byte. HSVN Algorithm can hide the signature more easily and more invisibly. Moreover, it can hide a large amount of information with little redundancy added to the program.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia Data-embedding and Watermarking Technologies. Proc. of the IEEE 86(6), 1054–1087 (1998)
Collberg, C.S., Thomborson, C.: Watermarking,Tamper-proofing, and Obfuscation-tools for Software Protection. IEEE Transactions on Software Engineering 28, 735–746 (2002)
Hamilton, J., Danicic, S.: A Survey of Static Software Watermarking. In: Internet Security, pp. 100–107 (2011)
Dai, P., Wang, C., Yu, Z., Yue, Y., Wang, J.: A Software Watermark Based Architecture for Cloud Security. In: Sheng, Q.Z., Wang, G., Jensen, C.S., Xu, G. (eds.) APWeb 2012. LNCS, vol. 7235, pp. 270–281. Springer, Heidelberg (2012)
Chroni, M., Nikolopoulos, S.D.: Encoding Watermark Numbers as Cographs using Self-inverting Permutations. In: 12th International Conference on Computer Systems and Technologies, pp. 142–148 (2011)
Zhang, S., Zhu, G., Wang, Y.: A Strategy of Software Protection based on Multi-watermarking Embedding. In: 2nd International Conference on Control, Instrumentation and Automation, pp. 444–447 (2011)
Collberg, C.S., Thomborson, C.: On the Limits of Software Watermarking. Technical Report. 164 (August 1998)
Davidson, R.I., Myhrvold, N.: Method and System for Generating and Auditing a Signature for a Computer Program (September 1996)
Holmes, K.: Computer Software Protection. International Business Machines Corporation (February 1994)
Samson, P.R.: Apparatus and Method for Serializing and Validating Copies of Computer Software (February 1994)
Qu, G., Potkonjak, M.: Analysis of Watermarking Techniques for Graph Coloring Problem. In: Proceedings of the 1998 IEEE/ACM International Conference on Computer-aided Design, pp. 190–193 (1998)
Myles, G., Collberg, C.S.: Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 274–293. Springer, Heidelberg (2004)
Collberg, C.S., Thomborson, C.: Software Watermarking: Models and Dynamic Embeddings. In: Conference Record of the Annual ACM Symposium on Principles of Programming Languages, pp. 311–324 (1999)
Collberg, C.S., Huntwork, A., Carter, E., Townsend, G.: Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 192–207. Springer, Heidelberg (2004)
Venkatesan, R., Vazirani, V.V., Sinha, S.: A Graph Theoretic Approach to Software Watermarking. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 157–168. Springer, Heidelberg (2001)
Collberg, C.S., Huntwork, A., Carter, E., Townsend, G.: Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 192–207. Springer, Heidelberg (2004)
Shirali-Shahreza, M., Shirali-Shahreza, S.: Software Watermarking by Equation Reordering. In: 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA (2008)
Asmuth, C., Bloom, J.: AModular Approach to Key Safeguarding. IEEE Transactions on Information Theory IT-29, 208–210 (1983)
Myers, A.C., Liskow, B.: Protecting Privacy Using the Decentralized Label Model. ACM Transactions on Software Engineering and Methodology 9(4), 410–442 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Su, Y., Liu, J., Li, D. (2013). Hiding Signatures in Variable Names. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_42
Download citation
DOI: https://doi.org/10.1007/978-3-642-35795-4_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35794-7
Online ISBN: 978-3-642-35795-4
eBook Packages: Computer ScienceComputer Science (R0)