Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
Architecture of VBSW

Architecture of VBSW

Ratings: (0)|Views: 49 |Likes:
Published by JournalofICT
Journal of Information and Communication Technologies, ISSN 2047-3168, Volume 2, Issue 10, November 2012 http://www.jict.co.uk
Journal of Information and Communication Technologies, ISSN 2047-3168, Volume 2, Issue 10, November 2012 http://www.jict.co.uk

More info:

Categories:Types, Research
Published by: JournalofICT on Nov 10, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/06/2013

pdf

text

original

 
JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGIES, VOLUME 2, ISSUE 10, NOVEMBER 2012
 © 2012 JICTwww.jict.co.uk
5
ARCHITECTURE OF VBSW
Seetha Mahalaxmi . D, B. Dr. Viswanadha Raju . S and C. Dr. Vinay Babu . A
Abstract:-
Software is a comprehensive view of set of Algorithms, Data Structures, User Interface,and trade off of the implementation details. In order to provide security for this software various techniquessuch as cryptography, steganography, were proposed. Software watermarking is one technique that protectsthe ownership rights. There are so many software watermarking algorithms that have been developed. Inpattern to these a new model was proposed which is known as Version Based Watermark or in short VBSW.This main theme of this model is to create a watermark using LOC of the software and version number of thesoftware. In the remaining part of the paper the architecture of the VBSW and Frame model of the VBSW arediscussed.
Keywords
:
VBSW, LOC, Version Number, Version Watermark 
 
F.A.
Seetha Mahalaxmi .D,
is the Associate Professor, Department of CSE, JNUHCEH.S.B. Dr.
Viswanadha Raju. S,
is the Professor, and HOD of CSE, JNTUHCEJ.T.C. Dr.
Vinay Babu. A,
Principal, JNTUHCEH.
1.
 
INTRODUCTION
A key element of any software is to protect thesoftware from various attacks and in case if any theft has occurred then the developer mustbe able to prove their ownership[1][3][4].Software Watermarking is one of thetechnique which helps in proving theauthentication of the developer in which thedeveloper embeds a secret message into covermessage. A lot of research was done inSoftware watermarking[2][5][6][7][8][9][10][11][12] but all this work is discussing on various embedding techniquesof a software watermark into a program andthe software watermark which was used forembedding is a serial number or a uniqueidentification of the developer. In this paper anew methodology to obtain the softwarewatermark, which is known as Version BasedSoftware Watermark, is given. The remainingpart of the paper the architecture and framemodel of VBSW are discussed.
 2.
 
MOTIVATION
Till now various algorithms areproposed for embedding the softwarewatermark into programs, and all thesealgorithms are discussing on differentways of embedding a software watermark into the program, some of the embeddingtechniques are dynamic graph[1], dynamicPath Based [2], Abstract Interpretation-Based Framework [3], embedding awatermark using graph problem[4][5]. Inall these techniques the watermark that isused to embed is a number in a binaryform, or a serial number. In the proposedwork a new method of evaluating theSoftware Watermark known as VersionBased Software Watermark is proposed.The main objective of the Version BasedSoftware Watermark is to act as acopyright protection and to protect thesoftware from the Version attack and LOCattack.
 3.
 
Problem Statement
Version Based Software Watermark is oneof new approach of a Software Watermark. Itis making use of LOC and Version number of software which are the heart of any software.The Lines of Code is the number of lines thathave been used to develop the software. Whilecounting this number of lines the dummy linesi.e the authors name, date of development, isnot counted for Lines of code. Version numberis the latest software release. Every release of the software has a new feature or a set of newfeatures with new version number.The Version Based Software Watermark iscalculated using the LOC and Version numberof the software. This is useful not only to
 
JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGIES, VOLUME 2, ISSUE 10, NOVEMBER 2012
 © 2012 JICTwww.jict.co.uk
6
prove the ownership of the software but alsocan be protected from version attack and linesof code attack. The goal of the work is that itmust be difficult to retrieve the watermark bythe attacker under different conditions.
4.
 
Architecture of Version Watermark
The architecture of VBSW consists of embedding the watermark into software,tamper-proofing, and obfuscating thesoftware, and at the receiving stage arecognizing process is carried out in order torecover the original watermark.
Figure:
SenderThe Version Watermark is calculated andinserted into the software, than the next step isto provide tamper-proof and finallyobfuscating a portion of the software so thatthe attacker is unable to reverse engineer or doother possible attacks. At the receiving sidethe client re-calculates the Version Watermark and compares it with the received VersionWatermark.
5.
 
Frame Model of Version Watermark
A Version Watermark can be explained by thefollowing functions:
O (T (I (S, V) ) ) → S',
R (A(S')
 ) → V,
C: V = V'
Where O(T(I(S,V) is the Insertion of VersionWatermark V and subjecting it to tamper-proofing and Obfuscation functions, theresultant software is denoted by S'. R(A(S)) isthe recognizer function where VersionWatermark can be extracted correctly evenafter the software is subjected to variousattacks. V' is the Version watermark whichwas computed from the received software. Cis the comparison where it comparescalculated Version watermark V' with the V.
Definition 1 (LOC):
The LOC is a sequenceof instructions or code which gives thefunctionality of the software. This does nottake into account any comments that areincluded in the software. Symbolically can berepresented as
 L(S) = l
.
Definition 2 (Version):
The software is modelwhich can be used to perform specificfunctionality or a set of functionalities. Thereleased software can be once again updated toadd new functionality. The software obtainedfor each release can be identified by versionnumber. Symbolically can be represented as
 Z(S) = z
.
Definition 3 (Version Watermark):
VersionWatermark is a watermark which is computedusing the values of LOC l, version number z,and assuming the probability of success thatthe attack is not possible is 0.8.
=
 Definition 4 (Insertion of Watermark):
The Insertion function inserts aVersion Watermark after performing varioustransformations such as Tamper-proofing andObfuscation on it. Mathematically the samecan be expressed as:

:
,
′ 
 Definition 5 (Recognize):
The Recognizerhelps to prove the ownership of the developer.The recognizer function can be expressed as:
Software, S Calculate, V Inserting Tamper-proof Recognizer,VServerObfuscate,S'
 
 
JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGIES, VOLUME 2, ISSUE 10, NOVEMBER 2012
 © 2012 JICTwww.jict.co.uk
7

:
′ 
′ 
 
Where V' is calculated using the LOC andVersion number of the received software.
Definition 6 (Compare):
The receivedwatermark is compared to the calculatedwatermark. Mathematically can be expressedas:

:
′ 
=
 
If compare function returns true than it meansthat the watermark is present and not distorted,or if the compare function evaluates to thefalse than it means that attack was performedon the software.
6.
 
CONCLUSION
In this paper a brief note on the Motivation of VBSW, the Frame Model of VBSW and thearchitecture of VBSW are proposed.
References
1.
 
D.Curran, N.Hurley, and
M.O.Cinneide, “Securing Java throughsoftware watermarking”, in
Proceedings of the 2
nd
internationalconference on Principles and Practiceof Programming in Java, 2003, pp. 311
 – 
324.2.
 
C.Colleberg and C.Thomberson,
“Software Watermarking: Models andDynamic Embeddings”, in Proceedings
of Symposium on Principles of Programming Languages, POPL'99,1999, pp. 311
 – 
324.3.
 
Hirose, N., Okamoto, E., Mambo, M.,
“A proposal for software protetion”, in
proc. 1998 Symposium onCryptography and Information
Security, SCIS’98
-9.2.C, Jan. 1998. (inJapanese)4.
 
A.B.Kahng, J. Lach, W.H.Mangoine-Smith, S,. Mantik, I.L.Markov, M.Potkonjak, P.Tucker, H.Wang, , and
G.Wolfe, “Watermarking Techniquesfor Intellectual Property Protection”,
Proc. 35
th
ACM/ IEEE DAC design
Automation Conf. (DAC’98), pp. 776
-781, June 1999.5.
 
S. Kannan and T.A.Proebsting,Register allocation in structuredPrograms, Journal of Algorithms,29(2); 223-237, Nov.1998.6.
 
A.Monden, H.Iida, and K.ichi
Matsumoto, “A practical method for watermarking Java programs”, in The
24
th
Computer Software andApplications Conference, 2000, pp.191
 – 
197.7.
 
A.Monden, H.Iida, and K.ichiMatsumoto, K.Inoue, and K.Torii,
“Watermarking Java Programs”, in
International Symposium on FutureSoftware Technology'99, Ocotober1999, pp. 119
 – 
124.8.
 
G.Qu and M.Potkonjak, Analysis of watermarking techniques for graphcoloring problem, in IEEE/ACMInternational Cnference on ComputerAided Design, pages 190-193, Nov.1998.9.
 
G.Qu and M.Potkonjak, “Hiding
Signatures in graph coloring
solutions”, in Information Hiding
Worshop '99, pp.348 -367.10.
 
T.Sahoo and C.Collberg, “Software
watermarking in the frequencydomain: Implementation, analysis, and
attacks”, in Computer Science
department, University of Arizona(USA), Technical Report, vol. TR0407, March 2004.11.
 
J.Stern, G.Hachez, P.Kouene, and
J.J.Quisquater, “Robust objectwatermarking: Application to code”, in
Information Hiding Workshop'99,1999, pp.368
 – 
 
R.Venkatesan, V.Vazirani, and
S.Sinha, “A Graph Theoretic approach

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->