Advertisement

Watermarking Software to Signal Copy Protection

  • Ernő Jeges
  • Zoltán Hornák
  • Gergely Eberhardt
  • Zoltán Nagy
Part of the Communications in Computer and Information Science book series (CCIS, volume 1)

Abstract

Enforcement of copyright laws of software products is primarily managed in legal way, as the available technological solutions are not strong enough to prevent illegal distribution and use of software. This situation is particularly dangerous on the growing market of mobile software products: the lack of protection may be the most important setback of the expansion of this market, although we have all the necessary components to assure a trusted environment on handsets. In this paper we present our copy protection scheme called Swotector targeting primarily mobile phone applications, which combines techniques of obfuscation and software-watermarking to provide a solution which is purely technical, however still provides the necessary flexibility. Our test results have shown that the solution is efficient enough to overcome current challenges of software copy protection, above all the ability of the operating system to run both protected and non-protected applications.

Keywords

software copy protection software watermarking obfuscation reverse engineering trusted OS mobile software 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    First Annual BSA and IDC Global Software Privacy Study, Business Software Alliance and IDC Global Software (2004)Google Scholar
  2. 2.
    Mana, A., Lopez, J., Ortega, J.J., Pimentel, E., Troya, J.M.: A Framework for Secure Execution of Software. International Journal of Information Security 2(4), 99–112 (2004)CrossRefGoogle Scholar
  3. 3.
    Hachez, G.: A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards. Ph.D. thesis, Universite Catholique de Louvain, Louvain-la-Neuve (2003)Google Scholar
  4. 4.
    Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)Possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001)Google Scholar
  5. 5.
    International Telegraph and Telephone Consultative Committee (CCITT): The Directory— Authentication Framework. Recommendation X. 509 (1988)Google Scholar
  6. 6.
    Collberg, C., Thomborson, C., Townsend, G.M.: Dynamic Graph-Based Software Watermarking. Technical Report TR04-08 (2004)Google Scholar
  7. 7.
    Collberg, C., Thomborson, C., Low, D.: A Taxonomy of Obfuscating Transformations. Technical Report 148. Department of Computer Science, The University of Auckland (1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Ernő Jeges
    • 1
  • Zoltán Hornák
    • 1
  • Gergely Eberhardt
    • 2
  • Zoltán Nagy
    • 2
  1. 1.Department of Measurement and Information SystemsSEARCH LaboratoryBudapestHungary
  2. 2.SEARCH-LAB Ltd.Hungary

Personalised recommendations