Software Watermarking Deterring Software Piracy

Slides:



Advertisements
Similar presentations
PhD Student: Carlos Arthur Lang Lisbôa Advisor: Luigi Carro VLSI-SoC PhD Forum Low overhead system level approaches to deal with multiple and long.
Advertisements

Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Addressing the Trust Asymmetry Problem In Grid Computing with Encrypted Computation Peter A. Dinda Prescience Lab Department of Computer Science Northwestern.
Digital rights management Audio watermark Jiamian.
H Mar-01 Clark Thomborson Software Security CompSci 725 Handout 12: Student Presentations, Watermarking & Obfuscation Clark Thomborson University.
Traitor Tracing Jan-Jaap Oosterwijk Eindhoven University of Technology (TU/e) Department of Mathematics.
Techniques for Software Watermarking and Fingerprinting Prof. Clark Thomborson Presentation at Tsinghua University 17 th March 2010.
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
1 A Functional Taxonomy for Software Watermarking Jas Nagra, Clark Thomborson University of Auckland Christian Collberg University of Arizona.
Wmobf.1 1/5/00 Clark Thomborson Watermarking, Tamper-Proofing and Obfuscation – Tools for Software Protection Christian Collberg & Clark Thomborson Computer.
Bouncer securing software by blocking bad input Miguel Castro Manuel Costa, Lidong Zhou, Lintao Zhang, and Marcus Peinado Microsoft Research.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
18/03/2007Obfuscation 1 Software protection Mariano Ceccato FBK - Fondazione Bruno Kessler
Information Hiding in Program Binaries Rakan El-Khalil xvr  xvr  net.
Presented by Justin Bode CS 450 – Computer Security February 17, 2010.
Fifth International Conference on Information
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Yan Chen Dept. of Computer Science Northwestern University Information Security Curriculum Development in Northwestern.
Experiments in Software Watermarking Bradford P. Cuppy B.S. University of Evansville Fri, Nov 8, 2002.
CS590 Z Software Defect Analysis Xiangyu Zhang. CS590F Software Reliability What is Software Defect Analysis  Given a software program, with or without.
Achieving Trusted Systems by Providing Security and Reliability Ravishankar K. Iyer, Zbigniew Kalbarczyk, Jun Xu, Shuo Chen, Nithin Nakka and Karthik Pattabiraman.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Breaking Abstractions and Unstructuring Data Structures Christian Collberg Clark Thomborson Douglas Low “Mobile programs are distributed in forms that.
Preventing SQL Injection Attacks in Stored Procedures Alex Hertz Chris Daiello CAP6135Dr. Cliff Zou University of Central Florida March 19, 2009.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Copyright 2000, Odyssey Research Associates, Inc. SL Semantic Data Integrity DARPA Program Review Cornell Business & Technology Park 33 Thornwood.
Software Watermarking Imran Ali CSEP 590TU. What is software watermarking? Embed a secret into software which can be retrieved on demand Embed a secret.
Static Program Analysis of Embedded Software Ramakrishnan Venkitaraman Graduate Student, Computer Science Advisor: Dr. Gopal Gupta.
1 Experience With Software Watermarking Author: Jens Palsberg et al. Presenter: Charles He “Embedding Watermarking in dynamic data structures … can be.
1 Diversifying Sensors to Improve Network Resilience Wenliang (Kevin) Du Electrical Engineering & Computer Science Syracuse University.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Deriving Input Syntactic Structure From Execution Zhiqiang Lin Xiangyu Zhang Purdue University November 11 th, 2008 The 16th ACM SIGSOFT International.
Protecting Software Code By Guards The George Washington University Cs297 YU-HAO HU.
Research Direction Advisor: Frank,Yeong-Sung Lin Presented by Jia-Ling Pan 2010/10/211NTUIM OPLAB.
Fingerprinting Text in Logical Markup Languages Christian D. Jensen G.I. Davida and Y. Frankel (Eds.): Proc. Information Security Conference 2001, Lecture.
Presented by: Samia Azhar( ) Shahzadi Samia( )
Experience with Software Watermarking Jens Palsberg, Sowmya Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Yi Zhang CERIAS and Department of Computer.
A Partial Survey of the Perfect Digital Watermark Problem.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
Distributed Systems Architectures Chapter 12. Objectives  To explain the advantages and disadvantages of different distributed systems architectures.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Code Optimization.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Compilers Principles, Techniques, & Tools Taught by Jing Zhang
Cryptographic Hash Function
Software testing strategies 2
Recent Developments on Multimedia and Secure Networking Technologies
Methods for Software Protection
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Parag Agarwal Digital Watermarking Parag Agarwal
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Software Security.
Data hiding based Hamming code
Recent Developments on Multimedia and Secure Networking Technologies
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Presentation transcript:

Software Watermarking Deterring Software Piracy Beaux Sharifi CS591 Fall 2005

CS591 Software Watermarking - Beaux Sharifi Problem of Piracy 35% of all PC software pirated in 2004 $33 Billion dollars in losses in 2004 Software piracy is expected to rise due to increase in Internet usage 11/24/2018 CS591 Software Watermarking - Beaux Sharifi

What is Software Watermarking? Software Watermarking is the technique of embedding a secret message (digital rights) into a cover message (program). A form of Steganography Does not prevent piracy. Rather, deters it. (P+W) W Key P (P+W) (P+W) WSN’s have a variety of applications Golden Gate has motes used to study the effect of wind, traffic, and earthquakes on the structure of the bridge (use 50-100 accelerometers on a small section) (P+W) 11/24/2018 CS591 Software Watermarking - Beaux Sharifi

Software Watermarking Types Static Software Watermarks: Embedded within the static structure of the program. Static Data Watermarks Static Code Watermarks Dynamic Software Watermarks Embedded within the execution state of the program. Easter Eggs Execution Trace Dynamic Data Structure WSN’s have a variety of applications Golden Gate has motes used to study the effect of wind, traffic, and earthquakes on the structure of the bridge (use 50-100 accelerometers on a small section) 11/24/2018 CS591 Software Watermarking - Beaux Sharifi

Example Static Watermark Static Data Watermark: char copyright[] = “Property of XYZ Corporation, 2004”; Can Extract using GNU Strings: $> strings program.exe | grep XYZ $> Property of XYZ Corporation, 2004 WSN’s have a variety of applications Golden Gate has motes used to study the effect of wind, traffic, and earthquakes on the structure of the bridge (use 50-100 accelerometers on a small section) 11/24/2018 CS591 Software Watermarking - Beaux Sharifi

Example Dynamic Watermark Dynamic Easter Egg Watermark: Start Microsoft FreeCell Press Ctrl+Shift+F10 Click Abort Double-click Cards You Win! WSN’s have a variety of applications Golden Gate has motes used to study the effect of wind, traffic, and earthquakes on the structure of the bridge (use 50-100 accelerometers on a small section) 11/24/2018 CS591 Software Watermarking - Beaux Sharifi

De-watermarking Attacks Several types: Distortive: Destroy the watermark Subtractive: Remove the watermark Additive: Add additional watermarks Collusive: Compare the watermark Statistical: Analyze the watermark WSN’s have a variety of applications Golden Gate has motes used to study the effect of wind, traffic, and earthquakes on the structure of the bridge (use 50-100 accelerometers on a small section) 11/24/2018 CS591 Software Watermarking - Beaux Sharifi

CS591 Software Watermarking - Beaux Sharifi Example Attack Distortive Attack: char copyright[] = “Property of XYZ Corporation, 2004”; char a[] = “Prop”; char b[] = “erty”; char c[] = “ of “; char d[] = “XY”; char e[] = “Z”; … char m[] = “04”; char copyright[MAX]; copyright = a + b + … + m; Can no longer extract using GNU Strings: $> strings program.exe | grep XYZ $> WSN’s have a variety of applications Golden Gate has motes used to study the effect of wind, traffic, and earthquakes on the structure of the bridge (use 50-100 accelerometers on a small section) 11/24/2018 CS591 Software Watermarking - Beaux Sharifi

CS591 Software Watermarking - Beaux Sharifi Desirable Properties Desirable Properties of Watermarks: Resilient to Attacks Stealthy Efficient Have a High Data Rate Easy to Embed & Retrieve Mathematically Deliberate WSN’s have a variety of applications Golden Gate has motes used to study the effect of wind, traffic, and earthquakes on the structure of the bridge (use 50-100 accelerometers on a small section) 11/24/2018 CS591 Software Watermarking - Beaux Sharifi

Limitations of Software Watermarks Problem: All traditional software watermarking techniques except easter eggs are susceptible to distortive attacks. WSN’s have a variety of applications Golden Gate has motes used to study the effect of wind, traffic, and earthquakes on the structure of the bridge (use 50-100 accelerometers on a small section) 11/24/2018 CS591 Software Watermarking - Beaux Sharifi

Dynamic Graph Watermarking A new type of Dynamic Data Structure Watermark. Embeds watermark in the topology of a dynamically build graph structure. Result: Watermark embedded within pointer semantics of program. Therefore, it is resilient to distortive semantic-preserving attacks! P + W if (input == I) { P = new Node(); Q = new Node(); addEdge(P, Q); … } P P = new Node(); Q = new Node(); addEdge(P, Q); … Prime Number Q I also chose to study positioning algorithms based on sheer curiosity. 11/24/2018 CS591 Software Watermarking - Beaux Sharifi

CS591 Software Watermarking - Beaux Sharifi Attacks on DGW Dynamic Graph Watermarking (DGW) is still vulnerable to advanced types of distortive attacks. Can make DGW stronger by: Adding tamperproofing: Integrity Checking Check the integrity of DGW structure periodically. Constant Encoding Substitute program constants with DGW sub-tree. Opaque Predicates Create false dependencies on DGW structure Adding obfuscation: Obfuscate each copy of DGW program to protect against collusive attacks. Combining multiple approaches achieves the best results! 11/24/2018 CS591 Software Watermarking - Beaux Sharifi

CS591 Software Watermarking - Beaux Sharifi Future Work No software watermarking technique is immune to all types of attacks. There are no known defenses against Additive Attacks. 11/24/2018 CS591 Software Watermarking - Beaux Sharifi

CS591 Software Watermarking - Beaux Sharifi References Business Software Alliance, “Sixth Annual BSA global software piracy study”, http://www.bsa.org/globalstudy/upload/2005-Global-Study-English.pdf, undated, (Accessed: 7 Dec, 2005) C. Collberg and C. Thomborson, “Software Watermarking: Models and Dynamic Embeddings”, presented at POPL ’99. 26th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages. ACM, New York, NY, USA, 1999. Y. He, “Tamperproofing a Software Watermark by Encoding Constants”, Masters Thesis, University of Auckland, 2002. J. Palsberg, S. Krishnaswamy, K. Minseok, D. Ma, S. Qiuyun, and Y. Zhang, “Experience with Software Watermarking”, presented at 16th Annual Computer Security Applications Conference (ACSAC’00). IEEE Comput. Soc., Los Alamitos, CA, USA, 2000 11/24/2018 CS591 Software Watermarking - Beaux Sharifi