Abstract
Embedding a personal identifier as a watermark to Java classfile is effective in order to protect copyrights of them. Monden et al. [1] proposed watermarking scheme that embeds arbitrary character sequence to the target method in a Java classfiles. But the scheme can be only used to embed the same watermark to each user’s classfiles. Therefore, if we apply this scheme for embedding each user’s personal identifier, the watermarks can be specified by comparing two or more users’ Java classfiles. In this paper solve the problem by using “Classfiles Obfuscation” which is our obfuscation scheme for Java sourcecodes. By the scheme, we distribute all the methods among the all the Java classfiles at random. Evrey user’s Java classfiles will have different structures respectively by appling “Clasfiles Obfuscation”. As the result, to specify watermark by compareing classfiles will be difficult.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Monden, A., Iida, H., Matsumoto, K., Inoue, K., Torii, K.: A practical method for watermarking java programs. In: compsac2000, 24th Computer Software and Applications Conference (2000)
Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report of Deptartment of Computer Science 148, University of Auckland, New Zealand (1997)
Low, D.: Java control flow obfuscation (1998)
Wang, C., Hill, J., Knight, J., Davidson, J.: Software tamper resistance: Obstructing static analysis of programs. Technical Report CS-2000-12 (2000)
Sakabe, Y., Soshi, M., Miyaji, A.: Software obfuscation for object oriented languages. Technical report of ieice (2002)
Ogiso, T., Sakabe, Y., Soshi, M., Miyaji, A.: A new approach of software obfuscation based on the difficulty of interprocedural analysis. IEICE Transactions on Fundamentals E86-A, 176–186 (2003)
Kitagawa, T., Kaji, Y., Kasami, T.: Digital watermarking method for java programs. In: Symposium on cryptography and information security (scis1998) (1998)
(jmark: A lightweight tool for watermarking java class filess), http://se.aistnara.ac.jp/jmark/
(Don quixote), http://oikaze.com/tamada/Products/DonQuixote/
(Zelix klassmaster), http://www.zelix.com/klassmaster/
Myers, E.M.: A precise inter-procedural data flow algorithm. In: Proceedings of the 8th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 219–230. ACM Press, New York (1981)
(Mocha, the java decompiler), http://www.brouhaha.com/eric/computers/mocha.html
(Jad - the fast java decompiler), http://kpdus.tripod.com/jad.html
Lafore, R.: Data Structures and Algorithms in Java, 2nd edn. Sams, USA
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fukushima, K., Sakurai, K. (2004). A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation. In: Chae, KJ., Yung, M. (eds) Information Security Applications. WISA 2003. Lecture Notes in Computer Science, vol 2908. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24591-9_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-24591-9_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20827-3
Online ISBN: 978-3-540-24591-9
eBook Packages: Springer Book Archive