메뉴 건너뛰기




Volumn 28, Issue 8, 2002, Pages 735-746

Watermarking, tamper-proofing, and obfuscation - Tools for software protection

Author keywords

Intellectual property protection; Obfuscation; Tamper proofing; Watermarking

Indexed keywords

BINARY CODES; COMPUTER CRIME; INTELLECTUAL PROPERTY; REVERSE ENGINEERING; SECURITY OF DATA; WATERMARKING;

EID: 0036704573     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSE.2002.1027797     Document Type: Article
Times cited : (548)

References (99)
  • 1
    • 0012033928 scopus 로고    scopus 로고
    • revision 0.81, Aug.
    • 4C Entity, "Content Protection System Architecture," revision 0.81, available http://www.4centity.com/data/tech/cpsa/cpsa081.pdf, Aug. 2001.
    • (2001) Content Protection System Architecture
  • 2
    • 0025230154 scopus 로고
    • Secure circuit evaluation: A protocol based on hiding information from an oracle
    • M. Abadi and J. Feigenbaum, "Secure Circuit Evaluation: A Protocol Based on Hiding Information from an Oracle," J. Cryptology, vol. 2, no. 1, pp. 1-12, 1990.
    • (1990) J. Cryptology , vol.2 , Issue.1 , pp. 1-12
    • Abadi, M.1    Feigenbaum, J.2
  • 4
    • 0012066282 scopus 로고    scopus 로고
    • Atari Games Corp. and Tengen, Inc. v. Nintendo of America Inc. and Nintendo Co., Ltd., United States Court of Appeals for the Federal Circuit, Sept. 1992
    • Atari Games Corp. and Tengen, Inc. v. Nintendo of America Inc. and Nintendo Co., Ltd., United States Court of Appeals for the Federal Circuit, Sept. 1992.
  • 5
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • R.J. Anderson, ed., May
    • D. Aucsmith, "Tamper Resistant Software: An Implementation," Information Hiding, First Int'l Workshop, R.J. Anderson, ed., pp. 317-333, May 1996.
    • (1996) Information Hiding, First Int'l Workshop , pp. 317-333
    • Aucsmith, D.1
  • 9
    • 0030384775 scopus 로고    scopus 로고
    • Techniques for data hiding
    • W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for Data Hiding," IBM Systems J., vol. 35, nos. 3 & 4, pp. 313-336, 1996.
    • (1996) IBM Systems J. , vol.35 , Issue.3-4 , pp. 313-336
    • Bender, W.1    Gruhl, D.2    Morimoto, N.3    Lu, A.4
  • 12
    • 84964537271 scopus 로고
    • Program result checking: A new approach to making programs more reliable
    • S. Carlsson, A. Lingas, and R.G. Karlsson, eds., July
    • M. Blum, "Program Result Checking: A New Approach to Making Programs More Reliable," Proc. 20th Int'l Colloquium Automata, Languages, and Programming, S. Carlsson, A. Lingas, and R.G. Karlsson, eds., pp. 1-14, July 1993.
    • (1993) Proc. 20th Int'l Colloquium Automata, Languages, and Programming , pp. 1-14
    • Blum, M.1
  • 13
    • 0029214558 scopus 로고
    • Designing programs that check their work
    • Jan.
    • M. Blum and S. Kannan, "Designing Programs that Check Their Work," J. ACM, vol. 42, no. 1, pp. 269-291, Jan. 1995.
    • (1995) J. ACM , vol.42 , Issue.1 , pp. 269-291
    • Blum, M.1    Kannan, S.2
  • 15
    • 0035425512 scopus 로고    scopus 로고
    • Protecting and managing electronic content with a digital battery
    • Aug.
    • T.A. Budd, "Protecting and Managing Electronic Content with a Digital Battery," Computer, vol. 34, no. 8, pp. 2-8, Aug. 2001.
    • (2001) Computer , vol.34 , Issue.8 , pp. 2-8
    • Budd, T.A.1
  • 16
    • 0012037450 scopus 로고
    • Computer software protection against piracy in Taiwan
    • L.K. Chen, "Computer Software Protection against Piracy in Taiwan,' J. Asian Law, vol. 8, no. 1, 1994, http://www.columbia.edu/cu/asiaweb/v8n1chen.htm.
    • (1994) J. Asian Law , vol.8 , Issue.1
    • Chen, L.K.1
  • 17
    • 0002380598 scopus 로고    scopus 로고
    • Security issues in mobile code systems
    • D.M. Chess, "Security Issues in Mobile Code Systems," Mobile Agents and Security, pp. 1-8, 1998.
    • (1998) Mobile Agents and Security , pp. 1-8
    • Chess, D.M.1
  • 18
    • 0023294949 scopus 로고
    • Computer viruses-theory and experiments
    • F. Cohen, "Computer Viruses-Theory and Experiments," IFIP-TC11, Computers and Security, pp. 22-35, 1987.
    • (1987) IFIP-TC11, Computers and Security , pp. 22-35
    • Cohen, F.1
  • 22
    • 0032691819 scopus 로고    scopus 로고
    • Software watermarking: Models and dynamic embeddings
    • Jan.
    • C. Collberg and C. Thomborson, "Software Watermarking: Models and Dynamic Embeddings," Principles of Programming Languages (POPL '99), Jan. 1999, http://www.cs.auckland.ac.nz/collberg/Research/nz/̃collberg/Research/Public ations/CollbergThomborson99a/index.html.
    • (1999) Principles of Programming Languages (POPL '99)
    • Collberg, C.1    Thomborson, C.2
  • 23
    • 0004046658 scopus 로고    scopus 로고
    • Technical Report 148, Dept. of Computer Science, Univ. of Auckland, July
    • C. Collberg, C. Thomborson, and D. Low, "A Taxonomy of Obfuscating Transformations," Technical Report 148, Dept. of Computer Science, Univ. of Auckland, July 1997, http://www.cs.auckland.ac.nz/̃collberg/Research/Publications/CollbergThombo rsonLow97a.
    • (1997) A Taxonomy of Obfuscating Transformations
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 26
    • 0012064475 scopus 로고    scopus 로고
    • Compaq, "FreePort Express," http://www.support.compaq.com/amt/freeport/.
    • FreePort Express
  • 31
    • 0012070232 scopus 로고    scopus 로고
    • Ernie, Mar., Usenet:comp. misc
    • Ernie, "Disk Copy Protection," Mar. 1997, Usenet:comp. misc, http://groups.google.com/groups?selm=33256CC1.7EE040mitre.org.
    • (1997) Disk Copy Protection
  • 32
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky, "Software Protection and Simulation on Oblivious RAMs," J. ACM, vol. 43, no. 3, pp. 431-473, 1996.
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 33
    • 0002481588 scopus 로고    scopus 로고
    • Global software piracy: You can't get blood out of turnip
    • Sept.
    • R.D. Gopal and G.L. Sanders, "Global Software Piracy: You Can't Get Blood Out of Turnip," Comm. ACM, vol. 43, no. 9, pp. 83-89, Sept. 2000.
    • (2000) Comm. ACM , vol.43 , Issue.9 , pp. 83-89
    • Gopal, R.D.1    Sanders, G.L.2
  • 34
    • 84885405991 scopus 로고
    • Software protection: Myth or reality?
    • Aug.
    • J.R. Gosler, "Software Protection: Myth or Reality? CRYPTO'85-Advances in Cryptology, pp. 140-157, Aug. 1985.
    • (1985) CRYPTO'85-Advances in Cryptology , pp. 140-157
    • Gosler, J.R.1
  • 35
    • 0010902349 scopus 로고
    • Program identification
    • The British Computer Soc. Monographs in Informatics, Cambridge Univ. Press, second ed.
    • D. Grover, "Program Identification," The Protection of Computer Software: Its Technology and Applications, The British Computer Soc. Monographs in Informatics, Cambridge Univ. Press, second ed., 1992.
    • (1992) The Protection of Computer Software: Its Technology and Applications
    • Grover, D.1
  • 36
    • 84937414062 scopus 로고    scopus 로고
    • AsiaCrypt 2000
    • S. Hada, "Zero-Knowledge and Code Obfuscation," AsiaCrypt 2000, pp. 443-457, 2000, http://link.springer.de/link/service/series/0558/papers/1976/19760443.pdf.
    • (2000) Zero-Knowledge and Code Obfuscation , pp. 443-457
    • Hada, S.1
  • 37
    • 0023456849 scopus 로고
    • Public protection of software
    • Nov.
    • A. Herzberg and S.S. Pinter, "Public Protection of Software," ACM Trans. Computer Systems, vol. 5, no. 4, pp. 371-393, Nov. 1987.
    • (1987) ACM Trans. Computer Systems , vol.5 , Issue.4 , pp. 371-393
    • Herzberg, A.1    Pinter, S.S.2
  • 38
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • Mobile Agents and Security, Springer-Verlag
    • F. Hohl, "Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts," Mobile Agents and Security, pp. 92-113, vol. 1419, Lecture Notes in Computer Science, Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 92-113
    • Hohl, F.1
  • 39
  • 40
    • 0012069651 scopus 로고
    • US Patent 5,287,407, Assignee: International Business Machines, Feb.
    • K. Holmes, "Computer Software Protection," US Patent 5,287,407, Assignee: International Business Machines, Feb. 1994.
    • (1994) Computer Software Protection
    • Holmes, K.1
  • 41
    • 0030777732 scopus 로고    scopus 로고
    • Precise flow-insensitive may-alias analysis is NP-Hard
    • Jan.
    • S. Horwitz, "Precise Flow-Insensitive May-Alias Analysis is NP-Hard," TOPLAS, vol. 19, no. 1, pp. 1-6, Jan. 1997.
    • (1997) TOPLAS , vol.19 , Issue.1 , pp. 1-6
    • Horwitz, S.1
  • 43
    • 0012064477 scopus 로고    scopus 로고
    • IBM, "Cryptolopes," http://www.ibm.com/software/security/cryptolope/.
    • Cryptolopes
  • 45
    • 0031996445 scopus 로고    scopus 로고
    • Computing practices: Exploring steganography: Seeing the unseen
    • Feb.
    • N.F. Johnson and S. Jajodia, "Computing Practices: Exploring Steganography: Seeing the Unseen," Computer, vol. 31, no. 2, pp. 26-34, Feb. 1998, http://www.isse.gmu.edu/njohnson/pub/r2026.pdf.
    • (1998) Computer , vol.31 , Issue.2 , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 52
    • 0030676601 scopus 로고    scopus 로고
    • How to systematically classify computer security intrusions
    • U. Lindqvist and E. Jonsson, "How to Systematically Classify Computer Security Intrusions," Proc. 1997 IEEE Symp. Security and Privacy, pp. 154-163, 1997, http://www.ce.chalmers.se/staff/ulfl/pubs/sp97.
    • (1997) Proc. 1997 IEEE Symp. Security and Privacy , pp. 154-163
    • Lindqvist, U.1    Jonsson, E.2
  • 53
    • 0012099210 scopus 로고
    • Omniware: A universal substrate for web programming
    • S. Lucco, R. Wahbe, and O. Sharp, "Omniware: A Universal Substrate for Web Programming," Proc. WWW4, 1995.
    • (1995) Proc. WWW4
    • Lucco, S.1    Wahbe, R.2    Sharp, O.3
  • 55
    • 0012100966 scopus 로고
    • may.95/News.705.html, May-June
    • Apple's QuickTime lawsuit, http://www.macworld.com/pages/june.95/News.848.htmil and may.95/News.705.html, May-June 1995.
    • (1995) Apple's QuickTime lawsuit
  • 56
    • 0012092773 scopus 로고
    • Controlling copyright infringements of intellectual property: The case of computer software
    • June, part 2
    • Y. Malhotra, "Controlling Copyright Infringements of Intellectual Property: The Case of Computer Software," J. Systems Management, part 1, vol. 45, no. 6, pp. 32-35, June 1994, part 2: no. 7, pp. 12-17, July 1994.
    • (1994) J. Systems Management, part 1 , vol.45 , Issue.6 , pp. 32-35
    • Malhotra, Y.1
  • 57
    • 0012036005 scopus 로고
    • July
    • Y. Malhotra, "Controlling Copyright Infringements of Intellectual Property: The Case of Computer Software," J. Systems Management, part 1, vol. 45, no. 6, pp. 32-35, June 1994, part 2: no. 7, pp. 12-17, July 1994.
    • (1994) J. Systems Management, part 1 , Issue.7 , pp. 12-17
  • 58
    • 0012038524 scopus 로고
    • Pursuing pirates (unauthorized software copying)
    • Aug.
    • J. Martin, "Pursuing Pirates (Unauthorized Software Copying)," Datamation, vol. 35, no. 15, pp. 41-42, Aug. 1989.
    • (1989) Datamation , vol.35 , Issue.15 , pp. 41-42
    • Martin, J.1
  • 59
    • 0021494484 scopus 로고
    • Hardware protection against software piracy
    • Sept.
    • T. Maude and D. Maude, "Hardware Protection against Software Piracy," Comm. ACM, vol. 27, no. 9, pp. 950-959, Sept. 1984.
    • (1984) Comm. ACM , vol.27 , Issue.9 , pp. 950-959
    • Maude, T.1    Maude, D.2
  • 60
    • 0000675337 scopus 로고
    • Technical Report 7, Inst. of Information Sci. & Electron, Tsukuba Univ., Japan, July
    • R. Mori and M. Kawahara, "Superdistribution: The Concept and the Architecture," Technical Report 7, Inst. of Information Sci. & Electron, Tsukuba Univ., Japan, July 1990, http://www.site.gmu.edu/bcox/ElectronicFrontier/MoriSuperdist.html.
    • (1990) Superdistribution: The Concept and the Architecture
    • Mori, R.1    Kawahara, M.2
  • 62
    • 84889051784 scopus 로고    scopus 로고
    • How to copyright a function?
    • Public Key Encryption '99, Hideki Imai, ed., Springer-Verlag
    • D. Naccache, A. Shamir, and J.P. Stern, "How to Copyright a Function?" Public Key Encryption '99, Hideki Imai, ed., Lecture Notes in Computer Science, Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science
    • Naccache, D.1    Shamir, A.2    Stern, J.P.3
  • 64
    • 0012062320 scopus 로고    scopus 로고
    • NetSafe, Copyright
    • NetSafe, "EXE Guardian™," http://members.ozemail.com.au/netsafe/guardian_detailed_information.html, Copyright 1996.
    • (1996) EXE Guardian™
  • 70
    • 0032306157 scopus 로고    scopus 로고
    • Analysis of watermarking techniques for graph coloring problem
    • Nov.
    • G. Qu and M. Potkonjak, "Analysis of Watermarking Techniques for Graph Coloring Problem," Proc. IEEE/ACM Int'l Conf. Computer Aided Design, pp. 190-193, Nov. 1998, http://www.cs.ucta.edu/gangqu/publication/gc.ps.gz.
    • (1998) Proc. IEEE/ACM Int'l Conf. Computer Aided Design , pp. 190-193
    • Qu, G.1    Potkonjak, M.2
  • 73
    • 0012037694 scopus 로고    scopus 로고
    • June
    • H. Rosner, "Steal this Software," The.Standard.com, June 2000. http://www.thestandard.com/article/article_print/1,1153,16039,00.html.
    • (2000) Steal this Software
    • Rosner, H.1
  • 74
    • 0026869838 scopus 로고
    • Batch checking with applications to linear functions
    • May
    • R. Rubinfeld, "Batch Checking with Applications to Linear Functions," Information Processing Letters, vol. 42, no. 2, pp. 77-80, May 1992.
    • (1992) Information Processing Letters , vol.42 , Issue.2 , pp. 77-80
    • Rubinfeld, R.1
  • 75
    • 0002858816 scopus 로고    scopus 로고
    • Designing checkers for programs that run in parallel
    • Apr.
    • R. Rubinfeld, "Designing Checkers for Programs that Run in Parallel," Algorithmica, vol. 15, no. 4, pp. 287-301, Apr. 1996.
    • (1996) Algorithmica , vol.15 , Issue.4 , pp. 287-301
    • Rubinfeld, R.1
  • 77
    • 0025238177 scopus 로고
    • Reverse-engineering someone Else's software: Is it legal?
    • Jan.
    • P. Samuelson, "Reverse-Engineering Someone Else's Software: Is It Legal?" IEEE Software, pp. 90-96, Jan. 1990.
    • (1990) IEEE Software , pp. 90-96
    • Samuelson, P.1
  • 81
    • 0012068216 scopus 로고
    • Computer viruses as artificial life
    • E.H. Spafford, "Computer Viruses as Artificial Life," Artificial Life, vol. 1, no. 3, pp. 249-265, 1994.
    • (1994) Artificial Life , vol.1 , Issue.3 , pp. 249-265
    • Spafford, E.H.1
  • 85
    • 0033634469 scopus 로고    scopus 로고
    • Information security in multi-processor systems based on the χ86 architecture
    • Oct.
    • A. Torrubia and F.J. Mora, "Information Security in Multi-processor Systems Based on the χ86 Architecture," Computers and Security, vol. 19, no. 6, pp. 559-563, Oct. 2000.
    • (2000) Computers and Security , vol.19 , Issue.6 , pp. 559-563
    • Torrubia, A.1    Mora, F.J.2
  • 86
    • 0012066285 scopus 로고    scopus 로고
    • Defining terms in the intellectual property protection debate: Are the north and south arguing past each other when we say 'Property'? A Lockean, Confucian, and Islamic comparison
    • Winter
    • R.E. Vaughn, "Defining Terms in the Intellectual Property Protection Debate: Are the North and South Arguing Past Each Other When We Say 'Property'? A Lockean, Confucian, and Islamic Comparison," ILSA J. Comparative and Int'l Law, vol. 2, no. 2, p. 308, Winter 1996, http://www.nsulaw.nova.edu/student/organizations/ILSAJournal/2-2/Vaughan202-2.ht m.
    • (1996) ILSA J. Comparative and Int'l Law , vol.2 , Issue.2 , pp. 308
    • Vaughn, R.E.1
  • 93
    • 0004172766 scopus 로고    scopus 로고
    • PhD thesis, Univ. of Virginia, School of Eng. and Applied Science, Oct.
    • C. Wang, "A Security Architecture for Survivability Mechanisms," PhD thesis, Univ. of Virginia, School of Eng. and Applied Science, Oct. 2000, www.cs.virginia.edu/survive/pub/wangthesis.pdf.
    • (2000) A Security Architecture for Survivability Mechanisms
    • Wang, C.1
  • 96
    • 0031274275 scopus 로고    scopus 로고
    • Software reliability via run-time result-checking
    • Nov.
    • H. Wasserman and M. Blum, "Software Reliability via Run-Time Result-Checking," J. ACM, vol. 44, no. 6, pp. 826-849, Nov. 1997.
    • (1997) J. ACM , vol.44 , Issue.6 , pp. 826-849
    • Wasserman, H.1    Blum, M.2
  • 97
    • 0026954536 scopus 로고
    • Int'l software piracy
    • Nov.
    • S.P. Weisband and S.E. Goodman, "Int'l Software Piracy," Computer, vol. 92, no. 11, pp. 87-90, Nov. 1992.
    • (1992) Computer , vol.92 , Issue.11 , pp. 87-90
    • Weisband, S.P.1    Goodman, S.E.2
  • 98
    • 0012090357 scopus 로고    scopus 로고
    • Copyright
    • CD Media World, "CD Protections," http://www.cdmediaworld.com/hardware/cdrom/cd_protections.shtml, Copyright 1998-2001.
    • (1998) CD Protections
  • 99
    • 0012036007 scopus 로고    scopus 로고
    • Xerox
    • Xerox, "ContentGuard," http://www.contentguard.com.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.