Evaluating Effectiveness of Tamper Proofing on Dynamic Graph Software Watermarks

International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 3, pp. 057-063, December 2009, USA For enhancing the protection level of dynamic graph software watermarks and for the purpose of conducting the analysis which evaluates the effect of integrating two software pro...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Khiyal, Malik Sikandar Hayat, Khan, Aihab, Amjad, Sehrish, Khalil, M. Shahid
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Khiyal, Malik Sikandar Hayat
Khan, Aihab
Amjad, Sehrish
Khalil, M. Shahid
description International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 3, pp. 057-063, December 2009, USA For enhancing the protection level of dynamic graph software watermarks and for the purpose of conducting the analysis which evaluates the effect of integrating two software protection techniques such as software watermarking and tamper proofing, constant encoding technique along with the enhancement through the idea of constant splitting is proposed. In this paper Thomborson technique has been implemented with the scheme of breaking constants which enables to encode all constants without having any consideration about their values with respect to the value of watermark tree. Experimental analysis which have been conducted and provided in this paper concludes that the constant encoding process significantly increases the code size, heap space usage, and execution time, while making the tamper proofed code resilient to variety of semantic preserving program transformation attacks.
doi_str_mv 10.48550/arxiv.1001.1974
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1001_1974</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1001_1974</sourcerecordid><originalsourceid>FETCH-LOGICAL-a654-51d932bae279b36ecf0101067cc94bf924e933c461897c03e4a87277510b41053</originalsourceid><addsrcrecordid>eNotj7FOwzAURb10QC07E_IPJNixHcdjVUJBqkQlInWMXtxnsNrEkRMC_XsaQHe4y9W5OoTccZbKQin2APHbTylnjKfcaHlD9uUE508YffdOS-fQjn7CDoeBBkcraHuMdB9DcPMgdPTx0kHrLd1G6D_oW3DjF0SkBxgxthBPw4osHJwHvP3vJameymrznOxety-b9S6BXMlE8aMRWQOYadOIHK1j_JpcW2tk40wm0QhhZc4Loy0TKKHQmdaKs0ZypsSS3P9hf43qPvrr-6WezerZTPwAullIOg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Evaluating Effectiveness of Tamper Proofing on Dynamic Graph Software Watermarks</title><source>arXiv.org</source><creator>Khiyal, Malik Sikandar Hayat ; Khan, Aihab ; Amjad, Sehrish ; Khalil, M. Shahid</creator><creatorcontrib>Khiyal, Malik Sikandar Hayat ; Khan, Aihab ; Amjad, Sehrish ; Khalil, M. Shahid</creatorcontrib><description>International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 3, pp. 057-063, December 2009, USA For enhancing the protection level of dynamic graph software watermarks and for the purpose of conducting the analysis which evaluates the effect of integrating two software protection techniques such as software watermarking and tamper proofing, constant encoding technique along with the enhancement through the idea of constant splitting is proposed. In this paper Thomborson technique has been implemented with the scheme of breaking constants which enables to encode all constants without having any consideration about their values with respect to the value of watermark tree. Experimental analysis which have been conducted and provided in this paper concludes that the constant encoding process significantly increases the code size, heap space usage, and execution time, while making the tamper proofed code resilient to variety of semantic preserving program transformation attacks.</description><identifier>DOI: 10.48550/arxiv.1001.1974</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Multimedia</subject><creationdate>2010-01</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,781,886</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1001.1974$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1001.1974$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Khiyal, Malik Sikandar Hayat</creatorcontrib><creatorcontrib>Khan, Aihab</creatorcontrib><creatorcontrib>Amjad, Sehrish</creatorcontrib><creatorcontrib>Khalil, M. Shahid</creatorcontrib><title>Evaluating Effectiveness of Tamper Proofing on Dynamic Graph Software Watermarks</title><description>International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 3, pp. 057-063, December 2009, USA For enhancing the protection level of dynamic graph software watermarks and for the purpose of conducting the analysis which evaluates the effect of integrating two software protection techniques such as software watermarking and tamper proofing, constant encoding technique along with the enhancement through the idea of constant splitting is proposed. In this paper Thomborson technique has been implemented with the scheme of breaking constants which enables to encode all constants without having any consideration about their values with respect to the value of watermark tree. Experimental analysis which have been conducted and provided in this paper concludes that the constant encoding process significantly increases the code size, heap space usage, and execution time, while making the tamper proofed code resilient to variety of semantic preserving program transformation attacks.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Multimedia</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj7FOwzAURb10QC07E_IPJNixHcdjVUJBqkQlInWMXtxnsNrEkRMC_XsaQHe4y9W5OoTccZbKQin2APHbTylnjKfcaHlD9uUE508YffdOS-fQjn7CDoeBBkcraHuMdB9DcPMgdPTx0kHrLd1G6D_oW3DjF0SkBxgxthBPw4osHJwHvP3vJameymrznOxety-b9S6BXMlE8aMRWQOYadOIHK1j_JpcW2tk40wm0QhhZc4Loy0TKKHQmdaKs0ZypsSS3P9hf43qPvrr-6WezerZTPwAullIOg</recordid><startdate>20100112</startdate><enddate>20100112</enddate><creator>Khiyal, Malik Sikandar Hayat</creator><creator>Khan, Aihab</creator><creator>Amjad, Sehrish</creator><creator>Khalil, M. Shahid</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20100112</creationdate><title>Evaluating Effectiveness of Tamper Proofing on Dynamic Graph Software Watermarks</title><author>Khiyal, Malik Sikandar Hayat ; Khan, Aihab ; Amjad, Sehrish ; Khalil, M. Shahid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a654-51d932bae279b36ecf0101067cc94bf924e933c461897c03e4a87277510b41053</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Multimedia</topic><toplevel>online_resources</toplevel><creatorcontrib>Khiyal, Malik Sikandar Hayat</creatorcontrib><creatorcontrib>Khan, Aihab</creatorcontrib><creatorcontrib>Amjad, Sehrish</creatorcontrib><creatorcontrib>Khalil, M. Shahid</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Khiyal, Malik Sikandar Hayat</au><au>Khan, Aihab</au><au>Amjad, Sehrish</au><au>Khalil, M. Shahid</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Evaluating Effectiveness of Tamper Proofing on Dynamic Graph Software Watermarks</atitle><date>2010-01-12</date><risdate>2010</risdate><abstract>International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 3, pp. 057-063, December 2009, USA For enhancing the protection level of dynamic graph software watermarks and for the purpose of conducting the analysis which evaluates the effect of integrating two software protection techniques such as software watermarking and tamper proofing, constant encoding technique along with the enhancement through the idea of constant splitting is proposed. In this paper Thomborson technique has been implemented with the scheme of breaking constants which enables to encode all constants without having any consideration about their values with respect to the value of watermark tree. Experimental analysis which have been conducted and provided in this paper concludes that the constant encoding process significantly increases the code size, heap space usage, and execution time, while making the tamper proofed code resilient to variety of semantic preserving program transformation attacks.</abstract><doi>10.48550/arxiv.1001.1974</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1001.1974
ispartof
issn
language eng
recordid cdi_arxiv_primary_1001_1974
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Multimedia
title Evaluating Effectiveness of Tamper Proofing on Dynamic Graph Software Watermarks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-17T12%3A56%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Evaluating%20Effectiveness%20of%20Tamper%20Proofing%20on%20Dynamic%20Graph%20Software%20Watermarks&rft.au=Khiyal,%20Malik%20Sikandar%20Hayat&rft.date=2010-01-12&rft_id=info:doi/10.48550/arxiv.1001.1974&rft_dat=%3Carxiv_GOX%3E1001_1974%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true