TY - GEN
T1 - A graph theoretic approach to software watermarking
AU - Venkatesan, Ramarathnam
AU - Vazirani, Vijay
AU - Sinha, Saurabh
N1 - Funding Information:
It is gratefully acknowledged that this work has been supported by the Croatian Science Foundation through the “ICT-aided integration of Electric Vehicles into the Energy Systems with a high share of Renewable Energy Sources” iRESEV, collaborative research project grant No. 09/128 . and “Optimization of Renewable Electricity Generation Systems Connected in a Microgrid” collaborative research project, as well as European IEE project “BEAST” (Beyond Energy Action STrategies).
Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2001.
PY - 2001
Y1 - 2001
N2 - We present a graph theoretic approach for watermarking software in a robust fashion. While watermarking software that are small in size (e.g. a few kilobytes) may be infeasible through this approach, it seems to be a viable scheme for large applications. Our approach works with control/data flow graphs and uses abstractions,approximate k-partitions,and a random walk method to embed the watermark,with the goal of minimizing and controlling the additions to be made for embedding,while keeping the estimated effort to undo the watermark (WM) as high as possible. The watermarks are so embedded that small changes to the software or flow graph are unlikely to disable detection by a probabilistic algorithm that has a secret. This is done by using some relatively robust graph properties and error correcting codes. Under some natural assumptions about the code added to embed the WM,locating the WM by an attacker is related to some graph approximation problems. Since little theoretical foundation exists for hardness of typical instances of graph approximation problems,we present heuristics to generate such hard instances and,in a limited case, present a heuristic analysis of how hard it is to separate the WM in an information theoretic model. We describe some related experimental work. The approach and methods described here also suitable for solving the problem of software tamper resistance.
AB - We present a graph theoretic approach for watermarking software in a robust fashion. While watermarking software that are small in size (e.g. a few kilobytes) may be infeasible through this approach, it seems to be a viable scheme for large applications. Our approach works with control/data flow graphs and uses abstractions,approximate k-partitions,and a random walk method to embed the watermark,with the goal of minimizing and controlling the additions to be made for embedding,while keeping the estimated effort to undo the watermark (WM) as high as possible. The watermarks are so embedded that small changes to the software or flow graph are unlikely to disable detection by a probabilistic algorithm that has a secret. This is done by using some relatively robust graph properties and error correcting codes. Under some natural assumptions about the code added to embed the WM,locating the WM by an attacker is related to some graph approximation problems. Since little theoretical foundation exists for hardness of typical instances of graph approximation problems,we present heuristics to generate such hard instances and,in a limited case, present a heuristic analysis of how hard it is to separate the WM in an information theoretic model. We describe some related experimental work. The approach and methods described here also suitable for solving the problem of software tamper resistance.
UR - http://www.scopus.com/inward/record.url?scp=84947285817&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84947285817&partnerID=8YFLogxK
U2 - 10.1007/3-540-45496-9_12
DO - 10.1007/3-540-45496-9_12
M3 - Conference contribution
AN - SCOPUS:84947285817
SN - 3540427333
SN - 9783540427339
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 157
EP - 168
BT - Information Hiding - 4th International Workshop, IH 2001, Proceedings
A2 - Moskowitz, Ira S.
PB - Springer
T2 - 4th International Information Hiding Workshop, IHW 2001
Y2 - 25 April 2001 through 27 April 2001
ER -