Abstract
Enforcement of copyright laws of software products is primarily managed in legal way, as the available technological solutions are not strong enough to prevent illegal distribution and use of software. This situation is particularly dangerous on the growing market of mobile software products: the lack of protection may be the most important setback of the expansion of this market, although we have all the necessary components to assure a trusted environment on handsets. In this paper we present our copy protection scheme called Swotector targeting primarily mobile phone applications, which combines techniques of obfuscation and software-watermarking to provide a solution which is purely technical, however still provides the necessary flexibility. Our test results have shown that the solution is efficient enough to overcome current challenges of software copy protection, above all the ability of the operating system to run both protected and non-protected applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
First Annual BSA and IDC Global Software Privacy Study, Business Software Alliance and IDC Global Software (2004)
Mana, A., Lopez, J., Ortega, J.J., Pimentel, E., Troya, J.M.: A Framework for Secure Execution of Software. International Journal of Information Security 2(4), 99–112 (2004)
Hachez, G.: A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards. Ph.D. thesis, Universite Catholique de Louvain, Louvain-la-Neuve (2003)
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)Possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001)
International Telegraph and Telephone Consultative Committee (CCITT): The Directory— Authentication Framework. Recommendation X. 509 (1988)
Collberg, C., Thomborson, C., Townsend, G.M.: Dynamic Graph-Based Software Watermarking. Technical Report TR04-08 (2004)
Collberg, C., Thomborson, C., Low, D.: A Taxonomy of Obfuscating Transformations. Technical Report 148. Department of Computer Science, The University of Auckland (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jeges, E., Hornák, Z., Eberhardt, G., Nagy, Z. (2007). Watermarking Software to Signal Copy Protection. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds) Computer Network Security. MMM-ACNS 2007. Communications in Computer and Information Science, vol 1. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73986-9_36
Download citation
DOI: https://doi.org/10.1007/978-3-540-73986-9_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73985-2
Online ISBN: 978-3-540-73986-9
eBook Packages: Computer ScienceComputer Science (R0)