SlideShare a Scribd company logo
1 of 2
Download to read offline
International Journal of Engineering Inventions
ISSN: 2278-7461, www.ijeijournal.com
Volume 1, Issue 7 (October2012) PP: 20-21


        ATTACK MODEL OF VERSION BASED SOFTWARE
                     WATERMARK
              D.Seetha Mahalaxmi1, Dr. S. Viswanatha Raju2, Dr. A. Vinay Babu3,
                          1
                              Associate Professor, Dept. of CSE, JNTUHCEH, Hyderabad - '85
                                   2
                                    Professor, H OD of C S E, JNTUHCEJ, Wrarangal
                                         3
                                          Principal, JNTUHCEH, Hyderabad – '85


Abstract:––Software Watermarking is an important tool for combating the Software Piracy. Software Watermarking is an
approach to the problem of copyright protection that involves embedding ownership information in an executable program.
The software watermark acts like an identifier and helps in proving the ownership of the owner. In this paper an Attack
Model of VBSW, a brief account on Version attack, and LOC are discussed.

Keywords:––VBSW, version attack, LOC attack

                                            I.           INTRODUCTION
           Software Watermark is a technique where a watermark W, is embedded into a program such that W can be
reliably located and extracted from P even after P is subjected to semantic preserving transformations such as code
optimization and obfuscation. The utility of a software watermark depends on its resilience against semantics-preserving
code transformations: it is easy to destroy the watermark via simple transformations. The goal of the Software Watermarking
is to come up with watermarking techniques that are “expensive enough” to break in terms of time, effort, or resources.
Embedding Techniques
           A lot of research is done in order to embed a given watermark into a program, such as Basic Block sequence[1] in
which a software serial number is encoded in the basic block sequence of a program’s control flow graphs, register
interference graphs [3], watermark is embedded in a control flow structure [5]of a designed piece of a program, Stern et al
[4] embeds the watermark in the relative frequencies of instructions throughout the entire program using a spread spectrum
technique.
Attacks on Software Watermark
           Davidson’s method is easily destroyed by many locality-improving optimizations, Davidson [2]. This method
provides no protection against additive attacks; if the basic block structure to encode the watermark is reorganized, it is clear
that the original watermark can no longer be retrieved. reordering of the block sequence [3] . The main limitation of this is
addition of new nodes[5]. But these watermarks [4] are relatively vulnerable to relatively simple automated transformative
attacks that do not have too great impact on program performance.
Version Based Software Watermark
           It is observed that a lot of research is done on various embedding techniques, and the attacks that are possible on
these embedded software watermarks. The main theme of the paper is to opt for a new method of obtaining the watermark
which is known as Version Based Software Watermark.
Version Based Software Watermark, also known as VBSW, is a method to evaluate the value of Version watermark. The
version watermark can be computed by making use of Lines of code and Version number of software. Since it is fact that
LOC and version number plays a vital role in the software, these two terms are used for computing the version watermark.
Attack Model of Version Based Software Watermark
           A Model is a frame which shows the pictorial representation of the sequence of actions. An attack model of the
Software Watermark gives the various attacks that are possible on software.
Alice the author of the software has embedded secret information, known as watermark, and uploaded into the server, for the
use by all other members of her organization. Danny, an attacker, has performed various transformations on Alice’s software
so that Alice is unable to prove her ownership.




ISSN: 2278-7461                                    www.ijeijournal.com                                           P a g e | 20
Attack Model of Version Based Software Watermark



                                    Alice                   Software                       Server




                                                   Modify LOC

                                               Replace new                                 Danny
                                            Version of Software
                                             with old Version


                                 Fig. 1. Attack Model of Version Based Software Watermark

Two types of attacks are shown
           i. Updating the LOC, i.e insertion of new lines or deletion of existing lines so that some of the functionality of the
software is missing,
ii. Replacement of new version software with old version software.
Definition of Version Attack and LOC Attack
Definition 1 (Version Attack): An attacker replaces the current version software with the old version software is known as
Version attack.
                                                        𝑉𝐴: 𝑆 ′′′ 𝑧 ≠ 𝑆(𝑧)
Definition 2 (LOC Attack): The updation of the lines of code of the original software by the attacker is known as LOC
Attack.
                                                         𝐿𝐴: 𝑆 ′′′ 𝑙 ≠ 𝑆(𝑙)
Quality of VBSW
It is observed that the watermark is extracted effectively even after subjecting it to various attacks.

                                             II.          CONCLUSION
        In this paper the purpose of Software watermark its definition, various embedding techniques of software
watermark, attacks that are possible on these embedded software watermark are discussed. Finally a new method for creating
a watermark known as Version Based Software Watermark, also know as VBSW is introduced. The attack model of this
VBSW and the two different attacks are identified and defined.

                                                     REFERENCES
 1.       R. L. Davidson and N. Myhrvold. Method and system for generating and auditing a signature for a computer
          program. US Patent 5,559,884, September 1996. Assignee: Microsoft Corporation.
 2.       Robert L. Davidson, Nathan Myhrvold, Keith Randel Vogel, Gideon Andreas Yuval, Richard Shupak, and Norman
          Eugene Apperson. Method and system for improving the locality of memory references during execution of a
          computer program. US Patent 5,664,191,September 1997. Assignee: Microsoft Corporation.
 3.       G. Qu and M. Potkonjak. Analysis of watermarking techniques for graph coloring problem. In IEEE/ACM
          International Conference on Computer Aided Design, pages 190{193, November 1998.
 4.       J.P. Stern, G. Hachez, F. Koeune, and J.-J. Quisquater. Robust object watermarking: Application to code. In
          Information Hiding, page 368
 5.       R. Venkatesan, V. Vazirani, and S. Sinha. A graph theoretic approach to software watermarking. In 4 th
          International Information Hiding Workshop, Pittsburgh, PA, April 2001.




ISSN: 2278-7461                                    www.ijeijournal.com                                           P a g e | 21

More Related Content

Viewers also liked

Calendari escolar 14 15 famílies prades
Calendari escolar 14 15 famílies pradesCalendari escolar 14 15 famílies prades
Calendari escolar 14 15 famílies pradesSerradePrades
 
Nebraska State Bridge Profile
Nebraska State Bridge ProfileNebraska State Bridge Profile
Nebraska State Bridge Profileartba
 
Louisiana State Bridge Profile
Louisiana State Bridge ProfileLouisiana State Bridge Profile
Louisiana State Bridge Profileartba
 
Delaware State Bridge Profile
Delaware State Bridge ProfileDelaware State Bridge Profile
Delaware State Bridge Profileartba
 
Oregon State Bridge Profile
Oregon State Bridge ProfileOregon State Bridge Profile
Oregon State Bridge Profileartba
 
Consilierea si orientarea profesionala in lt tudor arghezi
Consilierea si orientarea profesionala in lt tudor argheziConsilierea si orientarea profesionala in lt tudor arghezi
Consilierea si orientarea profesionala in lt tudor argheziseven_leonardo2012
 
Socio group presentation assignment
Socio   group presentation assignmentSocio   group presentation assignment
Socio group presentation assignmentMemphis Wong
 
Feedback slide 11 11-2012
Feedback slide 11 11-2012Feedback slide 11 11-2012
Feedback slide 11 11-2012RaisedinBristol
 
Practica de aula virtual
Practica de aula virtualPractica de aula virtual
Practica de aula virtualmargarita2468
 
Huerto escolar
Huerto escolarHuerto escolar
Huerto escolarPepa Pepa
 
Illinois State Bridge Profile
Illinois State Bridge ProfileIllinois State Bridge Profile
Illinois State Bridge Profileartba
 
Horario celeyma rodriguez ii 2014
Horario celeyma rodriguez ii 2014Horario celeyma rodriguez ii 2014
Horario celeyma rodriguez ii 2014celeymarodriguezpdp
 

Viewers also liked (14)

Calendari escolar 14 15 famílies prades
Calendari escolar 14 15 famílies pradesCalendari escolar 14 15 famílies prades
Calendari escolar 14 15 famílies prades
 
Nebraska State Bridge Profile
Nebraska State Bridge ProfileNebraska State Bridge Profile
Nebraska State Bridge Profile
 
Louisiana State Bridge Profile
Louisiana State Bridge ProfileLouisiana State Bridge Profile
Louisiana State Bridge Profile
 
Delaware State Bridge Profile
Delaware State Bridge ProfileDelaware State Bridge Profile
Delaware State Bridge Profile
 
Oregon State Bridge Profile
Oregon State Bridge ProfileOregon State Bridge Profile
Oregon State Bridge Profile
 
TUGAS IPA
TUGAS IPATUGAS IPA
TUGAS IPA
 
Izengabea 1
Izengabea 1Izengabea 1
Izengabea 1
 
Consilierea si orientarea profesionala in lt tudor arghezi
Consilierea si orientarea profesionala in lt tudor argheziConsilierea si orientarea profesionala in lt tudor arghezi
Consilierea si orientarea profesionala in lt tudor arghezi
 
Socio group presentation assignment
Socio   group presentation assignmentSocio   group presentation assignment
Socio group presentation assignment
 
Feedback slide 11 11-2012
Feedback slide 11 11-2012Feedback slide 11 11-2012
Feedback slide 11 11-2012
 
Practica de aula virtual
Practica de aula virtualPractica de aula virtual
Practica de aula virtual
 
Huerto escolar
Huerto escolarHuerto escolar
Huerto escolar
 
Illinois State Bridge Profile
Illinois State Bridge ProfileIllinois State Bridge Profile
Illinois State Bridge Profile
 
Horario celeyma rodriguez ii 2014
Horario celeyma rodriguez ii 2014Horario celeyma rodriguez ii 2014
Horario celeyma rodriguez ii 2014
 

Similar to International Journal of Engineering Inventions (IJEI)

Version based software watermark
Version based software watermarkVersion based software watermark
Version based software watermarkeSAT Journals
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysisAsif Anik
 
Application Security Guide for Beginners
Application Security Guide for Beginners Application Security Guide for Beginners
Application Security Guide for Beginners Checkmarx
 
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)CSCJournals
 
Mapping and visualization of source code a survey
Mapping and visualization of source code a surveyMapping and visualization of source code a survey
Mapping and visualization of source code a surveyNakul Sharma
 
Visualizing Object-oriented Software for Understanding and Documentation
Visualizing Object-oriented Software for Understanding and Documentation Visualizing Object-oriented Software for Understanding and Documentation
Visualizing Object-oriented Software for Understanding and Documentation Ra'Fat Al-Msie'deen
 
A taxonomy of obfuscating transformations
A taxonomy of obfuscating transformationsA taxonomy of obfuscating transformations
A taxonomy of obfuscating transformationsemanuele_nl
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management SystemIRJET Journal
 
Rational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentRational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentVESIT/University of Mumbai
 
SE Introduction sharbani bhattacharya
SE Introduction sharbani bhattacharyaSE Introduction sharbani bhattacharya
SE Introduction sharbani bhattacharyaSharbani Bhattacharya
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...IJNSA Journal
 
OWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideOWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideLudovic Petit
 

Similar to International Journal of Engineering Inventions (IJEI) (20)

Version based software watermark
Version based software watermarkVersion based software watermark
Version based software watermark
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysis
 
Effectiveness of AV in Detecting Web Application Backdoors
Effectiveness of AV in Detecting Web Application BackdoorsEffectiveness of AV in Detecting Web Application Backdoors
Effectiveness of AV in Detecting Web Application Backdoors
 
Application Security Guide for Beginners
Application Security Guide for Beginners Application Security Guide for Beginners
Application Security Guide for Beginners
 
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)
 
A26001006
A26001006A26001006
A26001006
 
Mapping and visualization of source code a survey
Mapping and visualization of source code a surveyMapping and visualization of source code a survey
Mapping and visualization of source code a survey
 
Visualizing Object-oriented Software for Understanding and Documentation
Visualizing Object-oriented Software for Understanding and Documentation Visualizing Object-oriented Software for Understanding and Documentation
Visualizing Object-oriented Software for Understanding and Documentation
 
A taxonomy of obfuscating transformations
A taxonomy of obfuscating transformationsA taxonomy of obfuscating transformations
A taxonomy of obfuscating transformations
 
Linkedin SOLIDSHIELD
Linkedin SOLIDSHIELDLinkedin SOLIDSHIELD
Linkedin SOLIDSHIELD
 
website phishing by NR
website phishing by NRwebsite phishing by NR
website phishing by NR
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 
Rational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentRational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability Assessment
 
SE Introduction sharbani bhattacharya
SE Introduction sharbani bhattacharyaSE Introduction sharbani bhattacharya
SE Introduction sharbani bhattacharya
 
A035401010
A035401010A035401010
A035401010
 
375 378
375 378375 378
375 378
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
 
Software Development Life Cycle
Software Development Life Cycle Software Development Life Cycle
Software Development Life Cycle
 
OWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideOWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference Guide
 

More from International Journal of Engineering Inventions www.ijeijournal.com

More from International Journal of Engineering Inventions www.ijeijournal.com (20)

H04124548
H04124548H04124548
H04124548
 
G04123844
G04123844G04123844
G04123844
 
F04123137
F04123137F04123137
F04123137
 
E04122330
E04122330E04122330
E04122330
 
C04121115
C04121115C04121115
C04121115
 
B04120610
B04120610B04120610
B04120610
 
A04120105
A04120105A04120105
A04120105
 
F04113640
F04113640F04113640
F04113640
 
E04112135
E04112135E04112135
E04112135
 
D04111520
D04111520D04111520
D04111520
 
C04111114
C04111114C04111114
C04111114
 
B04110710
B04110710B04110710
B04110710
 
A04110106
A04110106A04110106
A04110106
 
I04105358
I04105358I04105358
I04105358
 
H04104952
H04104952H04104952
H04104952
 
G04103948
G04103948G04103948
G04103948
 
F04103138
F04103138F04103138
F04103138
 
E04102330
E04102330E04102330
E04102330
 
D04101822
D04101822D04101822
D04101822
 
C04101217
C04101217C04101217
C04101217
 

International Journal of Engineering Inventions (IJEI)

  • 1. International Journal of Engineering Inventions ISSN: 2278-7461, www.ijeijournal.com Volume 1, Issue 7 (October2012) PP: 20-21 ATTACK MODEL OF VERSION BASED SOFTWARE WATERMARK D.Seetha Mahalaxmi1, Dr. S. Viswanatha Raju2, Dr. A. Vinay Babu3, 1 Associate Professor, Dept. of CSE, JNTUHCEH, Hyderabad - '85 2 Professor, H OD of C S E, JNTUHCEJ, Wrarangal 3 Principal, JNTUHCEH, Hyderabad – '85 Abstract:––Software Watermarking is an important tool for combating the Software Piracy. Software Watermarking is an approach to the problem of copyright protection that involves embedding ownership information in an executable program. The software watermark acts like an identifier and helps in proving the ownership of the owner. In this paper an Attack Model of VBSW, a brief account on Version attack, and LOC are discussed. Keywords:––VBSW, version attack, LOC attack I. INTRODUCTION Software Watermark is a technique where a watermark W, is embedded into a program such that W can be reliably located and extracted from P even after P is subjected to semantic preserving transformations such as code optimization and obfuscation. The utility of a software watermark depends on its resilience against semantics-preserving code transformations: it is easy to destroy the watermark via simple transformations. The goal of the Software Watermarking is to come up with watermarking techniques that are “expensive enough” to break in terms of time, effort, or resources. Embedding Techniques A lot of research is done in order to embed a given watermark into a program, such as Basic Block sequence[1] in which a software serial number is encoded in the basic block sequence of a program’s control flow graphs, register interference graphs [3], watermark is embedded in a control flow structure [5]of a designed piece of a program, Stern et al [4] embeds the watermark in the relative frequencies of instructions throughout the entire program using a spread spectrum technique. Attacks on Software Watermark Davidson’s method is easily destroyed by many locality-improving optimizations, Davidson [2]. This method provides no protection against additive attacks; if the basic block structure to encode the watermark is reorganized, it is clear that the original watermark can no longer be retrieved. reordering of the block sequence [3] . The main limitation of this is addition of new nodes[5]. But these watermarks [4] are relatively vulnerable to relatively simple automated transformative attacks that do not have too great impact on program performance. Version Based Software Watermark It is observed that a lot of research is done on various embedding techniques, and the attacks that are possible on these embedded software watermarks. The main theme of the paper is to opt for a new method of obtaining the watermark which is known as Version Based Software Watermark. Version Based Software Watermark, also known as VBSW, is a method to evaluate the value of Version watermark. The version watermark can be computed by making use of Lines of code and Version number of software. Since it is fact that LOC and version number plays a vital role in the software, these two terms are used for computing the version watermark. Attack Model of Version Based Software Watermark A Model is a frame which shows the pictorial representation of the sequence of actions. An attack model of the Software Watermark gives the various attacks that are possible on software. Alice the author of the software has embedded secret information, known as watermark, and uploaded into the server, for the use by all other members of her organization. Danny, an attacker, has performed various transformations on Alice’s software so that Alice is unable to prove her ownership. ISSN: 2278-7461 www.ijeijournal.com P a g e | 20
  • 2. Attack Model of Version Based Software Watermark Alice Software Server Modify LOC Replace new Danny Version of Software with old Version Fig. 1. Attack Model of Version Based Software Watermark Two types of attacks are shown i. Updating the LOC, i.e insertion of new lines or deletion of existing lines so that some of the functionality of the software is missing, ii. Replacement of new version software with old version software. Definition of Version Attack and LOC Attack Definition 1 (Version Attack): An attacker replaces the current version software with the old version software is known as Version attack. 𝑉𝐴: 𝑆 ′′′ 𝑧 ≠ 𝑆(𝑧) Definition 2 (LOC Attack): The updation of the lines of code of the original software by the attacker is known as LOC Attack. 𝐿𝐴: 𝑆 ′′′ 𝑙 ≠ 𝑆(𝑙) Quality of VBSW It is observed that the watermark is extracted effectively even after subjecting it to various attacks. II. CONCLUSION In this paper the purpose of Software watermark its definition, various embedding techniques of software watermark, attacks that are possible on these embedded software watermark are discussed. Finally a new method for creating a watermark known as Version Based Software Watermark, also know as VBSW is introduced. The attack model of this VBSW and the two different attacks are identified and defined. REFERENCES 1. R. L. Davidson and N. Myhrvold. Method and system for generating and auditing a signature for a computer program. US Patent 5,559,884, September 1996. Assignee: Microsoft Corporation. 2. Robert L. Davidson, Nathan Myhrvold, Keith Randel Vogel, Gideon Andreas Yuval, Richard Shupak, and Norman Eugene Apperson. Method and system for improving the locality of memory references during execution of a computer program. US Patent 5,664,191,September 1997. Assignee: Microsoft Corporation. 3. G. Qu and M. Potkonjak. Analysis of watermarking techniques for graph coloring problem. In IEEE/ACM International Conference on Computer Aided Design, pages 190{193, November 1998. 4. J.P. Stern, G. Hachez, F. Koeune, and J.-J. Quisquater. Robust object watermarking: Application to code. In Information Hiding, page 368 5. R. Venkatesan, V. Vazirani, and S. Sinha. A graph theoretic approach to software watermarking. In 4 th International Information Hiding Workshop, Pittsburgh, PA, April 2001. ISSN: 2278-7461 www.ijeijournal.com P a g e | 21