Watermarking Software to Signal Copy Protection
Enforcement of copyright laws of software products is primarily managed in legal way, as the available technological solutions are not strong enough to prevent illegal distribution and use of software. This situation is particularly dangerous on the growing market of mobile software products: the lack of protection may be the most important setback of the expansion of this market, although we have all the necessary components to assure a trusted environment on handsets. In this paper we present our copy protection scheme called Swotector targeting primarily mobile phone applications, which combines techniques of obfuscation and software-watermarking to provide a solution which is purely technical, however still provides the necessary flexibility. Our test results have shown that the solution is efficient enough to overcome current challenges of software copy protection, above all the ability of the operating system to run both protected and non-protected applications.
Keywordssoftware copy protection software watermarking obfuscation reverse engineering trusted OS mobile software
Unable to display preview. Download preview PDF.
- 1.First Annual BSA and IDC Global Software Privacy Study, Business Software Alliance and IDC Global Software (2004)Google Scholar
- 3.Hachez, G.: A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards. Ph.D. thesis, Universite Catholique de Louvain, Louvain-la-Neuve (2003)Google Scholar
- 4.Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)Possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001)Google Scholar
- 5.International Telegraph and Telephone Consultative Committee (CCITT): The Directory— Authentication Framework. Recommendation X. 509 (1988)Google Scholar
- 6.Collberg, C., Thomborson, C., Townsend, G.M.: Dynamic Graph-Based Software Watermarking. Technical Report TR04-08 (2004)Google Scholar
- 7.Collberg, C., Thomborson, C., Low, D.: A Taxonomy of Obfuscating Transformations. Technical Report 148. Department of Computer Science, The University of Auckland (1997)Google Scholar