Sciweavers

IH
2004
Springer

Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks

14 years 4 months ago
Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks
Abstract. This paper presents an implementation of the novel watermarking method proposed by Venkatesan, Vazirani, and Sinha in their recent paper A Graph Theoretic Approach to Software Watermarking. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks.
Christian S. Collberg, Andrew Huntwork, Edward Car
Added 02 Jul 2010
Updated 02 Jul 2010
Type Conference
Year 2004
Where IH
Authors Christian S. Collberg, Andrew Huntwork, Edward Carter, Gregg M. Townsend
Comments (0)