Skip to main content

Watermarking Software to Signal Copy Protection

  • Conference paper
Computer Network Security (MMM-ACNS 2007)

Abstract

Enforcement of copyright laws of software products is primarily managed in legal way, as the available technological solutions are not strong enough to prevent illegal distribution and use of software. This situation is particularly dangerous on the growing market of mobile software products: the lack of protection may be the most important setback of the expansion of this market, although we have all the necessary components to assure a trusted environment on handsets. In this paper we present our copy protection scheme called Swotector targeting primarily mobile phone applications, which combines techniques of obfuscation and software-watermarking to provide a solution which is purely technical, however still provides the necessary flexibility. Our test results have shown that the solution is efficient enough to overcome current challenges of software copy protection, above all the ability of the operating system to run both protected and non-protected applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. First Annual BSA and IDC Global Software Privacy Study, Business Software Alliance and IDC Global Software (2004)

    Google Scholar 

  2. Mana, A., Lopez, J., Ortega, J.J., Pimentel, E., Troya, J.M.: A Framework for Secure Execution of Software. International Journal of Information Security 2(4), 99–112 (2004)

    Article  Google Scholar 

  3. Hachez, G.: A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards. Ph.D. thesis, Universite Catholique de Louvain, Louvain-la-Neuve (2003)

    Google Scholar 

  4. Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)Possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001)

    Google Scholar 

  5. International Telegraph and Telephone Consultative Committee (CCITT): The Directory— Authentication Framework. Recommendation X. 509 (1988)

    Google Scholar 

  6. Collberg, C., Thomborson, C., Townsend, G.M.: Dynamic Graph-Based Software Watermarking. Technical Report TR04-08 (2004)

    Google Scholar 

  7. Collberg, C., Thomborson, C., Low, D.: A Taxonomy of Obfuscating Transformations. Technical Report 148. Department of Computer Science, The University of Auckland (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeges, E., Hornák, Z., Eberhardt, G., Nagy, Z. (2007). Watermarking Software to Signal Copy Protection. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds) Computer Network Security. MMM-ACNS 2007. Communications in Computer and Information Science, vol 1. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73986-9_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73986-9_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73985-2

  • Online ISBN: 978-3-540-73986-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics