A Novel Method-Based Software Watermarking Scheme

Author(s):  
Jian-qi Zhu ◽  
Yan-heng Liu ◽  
Ke-xin Yin
2011 ◽  
Vol 6 (1) ◽  
Author(s):  
Jianqi Zhu ◽  
Yanheng Liu ◽  
Aimin Wang ◽  
Kexin Yin

2018 ◽  
Vol 29 (2) ◽  
pp. 339-388
Author(s):  
MILA DALLA PREDA ◽  
MICHELE PASQUA

Software watermarking is a software protection technique used to defend the intellectual property of proprietary code. In particular, software watermarking aims at preventing software piracy by embedding a signature, i.e. an identifier reliably representing the owner, in the code. When an illegal copy is made, the owner can claim his/her identity by extracting the signature. It is important to hide the signature in the program in order to make it difficult for the attacker to detect, tamper or remove it. In this work, we present a formal framework for software watermarking, based on program semantics and abstract interpretation, where attackers are modelled as abstract interpreters. In this setting, we can prove that the ability to identify signatures can be modelled as a completeness property of the attackers in the abstract interpretation framework. Indeed, hiding a signature in the code corresponds to embed it as a semantic property that can be retrieved only by attackers that are complete for it. Any abstract interpreter that is not complete for the property specifying the signature cannot detect, tamper or remove it. We formalize in the proposed framework the major quality features of a software watermarking technique: secrecy, resilience, transparence and accuracy. This provides a unifying framework for interpreting both watermarking schemes and attacks, and it allows us to formally compare the quality of different watermarking techniques. Indeed, a large number of watermarking techniques exist in the literature and they are typically evaluated with respect to their secrecy, resilience, transparence and accuracy to attacks. Formally identifying the attacks for which a watermarking scheme is secret, resilient, transparent or accurate can be a complex and error-prone task, since attacks and watermarking schemes are typically defined in different settings and using different languages (e.g. program transformation vs. program analysis), complicating the task of comparing one against the others.


2016 ◽  
Vol 21 (3) ◽  
pp. 257-261
Author(s):  
Xiaoyan Sun ◽  
Maosheng Zhang ◽  
Shaowu Mao ◽  
Zhengwei Ren ◽  
Huanguo Zhang

Author(s):  
M.A. Gregory ◽  
G.P. Hadley

The insertion of implanted venous access systems for children undergoing prolonged courses of chemotherapy has become a common procedure in pediatric surgical oncology. While not permanently implanted, the devices are expected to remain functional until cure of the primary disease is assured. Despite careful patient selection and standardised insertion and access techniques, some devices fail. The most commonly encountered problems are colonisation of the device with bacteria and catheter occlusion. Both of these difficulties relate to the development of a biofilm within the port and catheter. The morphology and evolution of biofilms in indwelling vascular catheters is the subject of ongoing investigation. To date, however, such investigations have been confined to the examination of fragments of biofilm scraped or sonicated from sections of catheter. This report describes a novel method for the extraction of intact biofilms from indwelling catheters.15 children with Wilm’s tumour and who had received venous implants were studied. Catheters were removed because of infection (n=6) or electively at the end of chemotherapy.


Sign in / Sign up

Export Citation Format

Share Document