Skip to main content

Graph-Based Approaches to Software Watermarking

  • Conference paper
Graph-Theoretic Concepts in Computer Science (WG 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2880))

Included in the following conference series:

Abstract

In this paper, we discuss graph-theoretic approaches to software watermarking and fingerprinting. Software watermarking is used to discourage intellectual property theft and software fingerprinting is used to trace intellectual property copyright violations. We focus on two algorithms that encode information in software through the use of graph structures. We then consider the different attack models intended to disable the watermark while not affecting the correctness or performance of the program. Finally, we present several classes of graphs that can be used for watermarking and fingerprinting and analyze their properties (resiliency, data rate, performance, and stealthiness).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aho, A., Sethi, R., Ullman, J.: Compilers: Principles, Techniques, and Tools. Addison-Wesley, Reading (1986)

    Google Scholar 

  2. Anderson, R.J., Peticolas, F.A.: On the limits of steganography. IEEE J-SAC 16(4) (May 1998)

    Google Scholar 

  3. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3&4), 313–336 (1996)

    Article  Google Scholar 

  4. Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings. In: POPL 1999 (January 1999)

    Google Scholar 

  5. Collberg, C., Thomborson, C., Low, D.: Breaking abstractions and unstructuring data structures. In: ICCL 1998 (1998)

    Google Scholar 

  6. Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: POPL 1998 (January 1998)

    Google Scholar 

  7. Davidson, R.L., Myhrvold, N.: Method and system for generating and auditing a signature for a computer program. US Patent 5,559,884, Assignee: Microsoft Corporation (September 1996)

    Google Scholar 

  8. Ghiya, R., Hendren, L.J.: Is it a tree, a DAG, or a cyclic graph? A shape analysis for heap-directed pointers in C. In: POPL 1996, January 21-24, pp. 1–15 (1996)

    Google Scholar 

  9. Harary, F., Palmer, E.: Graphical Enumeration. Academic Press, New York (1973)

    MATH  Google Scholar 

  10. Kannan, S., Proebsting, T.A.: Register allocation in structured programs. Journal of Algorithms 29(2), 223–237 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  11. Knuth, D.E.: Fundamental Algorithms, 3rd edn. The Art of Computer Programming, vol. 1. Addison-Wesley, Reading (1997)

    MATH  Google Scholar 

  12. Qu, G., Potkonjak, M.: Analysis of watermarking techniques for graph coloring problem. In: IEEE/ACM Intl. Conference on CAD, pp. 190–193 (1998)

    Google Scholar 

  13. Ramalingam, G.: The undecidability of aliasing. ACM TOPLAS 16(5), 1467–1471 (1994)

    Article  Google Scholar 

  14. Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.-J.: Robust object watermarking: Application to code. Information Hiding, 368–378 (1999)

    Google Scholar 

  15. Tucker, A.: Applied Combinatorics, 3rd edn. Wiley, Chichester (1994)

    Google Scholar 

  16. Vanstone, S.A., Oorschot, P.C.V.: An Introduction to Error Correcting Codes with Applications. Klewer Academic Publishers, Dordrecht (1989)

    MATH  Google Scholar 

  17. Venkatesan, R., Vazirani, V., Sinha, S.: A graph theoretic approach to software watermarking. In: 4th Intl. Information Hiding Workshop (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Collberg, C., Kobourov, S., Carter, E., Thomborson, C. (2003). Graph-Based Approaches to Software Watermarking. In: Bodlaender, H.L. (eds) Graph-Theoretic Concepts in Computer Science. WG 2003. Lecture Notes in Computer Science, vol 2880. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39890-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39890-5_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20452-7

  • Online ISBN: 978-3-540-39890-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics