A Software Watermarking Method Based on Program Execution Time

被引:0
|
作者
Zhang Y. [1 ]
Chen K. [2 ]
Bao X. [3 ]
机构
[1] Trusted Computing and Information Assureance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing
[2] State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing
[3] Legendsec Information Technology(Beijing) Inc, Beijing
基金
中国国家自然科学基金;
关键词
Program execution; Software watermarking; Watermark encoding;
D O I
10.11999/JEIT1_190850
中图分类号
学科分类号
摘要
Currently, a main problem in software is repackaging or plagiarization, which means attackers can add malicious payloads or advertisements into legitimate APPs through piggybacking, it greatly threatens the users and original developers. In this paper, a novel Software Watermarking method based on Program Execution Time (SW_PET) is proposed. By generating a variety of effect-canceling operations, the watermark information can be encoded into the form of program execution time, and can be embedded into Android APPs. In the detection process, the watermark information is extracted and compared with the original watermark to check whether the APP is repackaged. This method can be combined with other types of watermarks (e.g., picture-based watermarks) in order to enhance the robustness. Finally, the effectiveness of the proposed approach is verified, and the overhead introduced by the watermark is measured, which is demonstrated to be minimal.
引用
收藏
页码:1811 / 1819
页数:8
相关论文
共 23 条
  • [1] (2019)
  • [2] ZHOU Wu, ZHANG Xinwen, JIANG Xuxian, AppInk: Watermarking android apps for repackaging deterrence, The 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 1-12, (2013)
  • [3] ZHOU Wu, ZHOU Yajin, JIANG Xuxian, Et al., Detecting repackaged smartphone applications in third-party android marketplaces, The 2nd ACM Conference on Data and Application Security and Privacy, pp. 317-326, (2012)
  • [4] State of security in the App Economy: Mobile apps under attack, (2012)
  • [5] CHEN Kai, ZHANG Yingjun, LIU Peng, Leveraging information asymmetry to transform android apps into self-defending code against repackaging attacks, IEEE Transactions on Mobile Computing, 17, 8, pp. 1879-1893, (2018)
  • [6] CHEN Kai, LIU Peng, ZHANG Yingjun, Achieving accuracy and scalability simultaneously in detecting application clones on android markets, The 36th International Conference on Software Engineering, pp. 175-186, (2014)
  • [7] CRUSSELL J, GIBLER C, CHEN Hao, AnDarwin: Scalable detection of semantically similar android applications, The 18th European Symposium on Research in Computer Security on Computer Security, pp. 182-199, (2013)
  • [8] (2013)
  • [9] Guardsquare, A specialized optimizer and obfuscator for android, (2013)
  • [10] CHEN Mingqi, NIU Xinyi, YANG Yixian, The attack methods of digital watermarking, Journal of Electronics&Information Technology, 23, 7, pp. 705-711, (2001)