Practical method for watermarking Java programs

Akito Monden, Hajimu Iida, Ken ichi Matsumoto, Katsuro Inoue, Koji Torii

Research output: Chapter in Book/Report/Conference proceedingConference contribution

56 Citations (Scopus)

Abstract

Java programs distributed through Internet are now suffering front program theft. It is because Java programs can be easily decomposed into reusable class files and even decompiled into source code by program users. In this paper we propose a practical method that discourages program theft by embedding Java programs with a digital watermark. Embedding a program developer's copyright notation as a watermark in Java class files will ensure the legal ownership of class files. Our embedding method is indiscernible by program users, yet enables us to identify an illegal program that contains stolen class files. The result of the experiment to evaluate our method showed most of the watermarks (20 out of 23) embedded in class files survived two kinds of attacks that attempt to erase watermarks: an obfuscactor attack, and a decompile-recompile attack.

Original languageEnglish
Title of host publicationProceedings - IEEE Computer Society's International Computer Software and Applications Conference
PublisherIEEE
Pages191-197
Number of pages7
Publication statusPublished - 2000
Externally publishedYes
Event2000 IEEE 24th Annual International Computer Software and Applications Conference (COMPSAC 2000) - Taipei, Taiwan
Duration: Oct 25 2000Oct 27 2000

Other

Other2000 IEEE 24th Annual International Computer Software and Applications Conference (COMPSAC 2000)
CityTaipei, Taiwan
Period10/25/0010/27/00

Fingerprint

Watermarking
Internet
Experiments

ASJC Scopus subject areas

  • Software

Cite this

Monden, A., Iida, H., Matsumoto, K. I., Inoue, K., & Torii, K. (2000). Practical method for watermarking Java programs. In Proceedings - IEEE Computer Society's International Computer Software and Applications Conference (pp. 191-197). IEEE.

Practical method for watermarking Java programs. / Monden, Akito; Iida, Hajimu; Matsumoto, Ken ichi; Inoue, Katsuro; Torii, Koji.

Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. IEEE, 2000. p. 191-197.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Monden, A, Iida, H, Matsumoto, KI, Inoue, K & Torii, K 2000, Practical method for watermarking Java programs. in Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. IEEE, pp. 191-197, 2000 IEEE 24th Annual International Computer Software and Applications Conference (COMPSAC 2000), Taipei, Taiwan, 10/25/00.
Monden A, Iida H, Matsumoto KI, Inoue K, Torii K. Practical method for watermarking Java programs. In Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. IEEE. 2000. p. 191-197
Monden, Akito ; Iida, Hajimu ; Matsumoto, Ken ichi ; Inoue, Katsuro ; Torii, Koji. / Practical method for watermarking Java programs. Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. IEEE, 2000. pp. 191-197
@inproceedings{ac8f31a2997f4ee1ab798ecf20cc824a,
title = "Practical method for watermarking Java programs",
abstract = "Java programs distributed through Internet are now suffering front program theft. It is because Java programs can be easily decomposed into reusable class files and even decompiled into source code by program users. In this paper we propose a practical method that discourages program theft by embedding Java programs with a digital watermark. Embedding a program developer's copyright notation as a watermark in Java class files will ensure the legal ownership of class files. Our embedding method is indiscernible by program users, yet enables us to identify an illegal program that contains stolen class files. The result of the experiment to evaluate our method showed most of the watermarks (20 out of 23) embedded in class files survived two kinds of attacks that attempt to erase watermarks: an obfuscactor attack, and a decompile-recompile attack.",
author = "Akito Monden and Hajimu Iida and Matsumoto, {Ken ichi} and Katsuro Inoue and Koji Torii",
year = "2000",
language = "English",
pages = "191--197",
booktitle = "Proceedings - IEEE Computer Society's International Computer Software and Applications Conference",
publisher = "IEEE",

}

TY - GEN

T1 - Practical method for watermarking Java programs

AU - Monden, Akito

AU - Iida, Hajimu

AU - Matsumoto, Ken ichi

AU - Inoue, Katsuro

AU - Torii, Koji

PY - 2000

Y1 - 2000

N2 - Java programs distributed through Internet are now suffering front program theft. It is because Java programs can be easily decomposed into reusable class files and even decompiled into source code by program users. In this paper we propose a practical method that discourages program theft by embedding Java programs with a digital watermark. Embedding a program developer's copyright notation as a watermark in Java class files will ensure the legal ownership of class files. Our embedding method is indiscernible by program users, yet enables us to identify an illegal program that contains stolen class files. The result of the experiment to evaluate our method showed most of the watermarks (20 out of 23) embedded in class files survived two kinds of attacks that attempt to erase watermarks: an obfuscactor attack, and a decompile-recompile attack.

AB - Java programs distributed through Internet are now suffering front program theft. It is because Java programs can be easily decomposed into reusable class files and even decompiled into source code by program users. In this paper we propose a practical method that discourages program theft by embedding Java programs with a digital watermark. Embedding a program developer's copyright notation as a watermark in Java class files will ensure the legal ownership of class files. Our embedding method is indiscernible by program users, yet enables us to identify an illegal program that contains stolen class files. The result of the experiment to evaluate our method showed most of the watermarks (20 out of 23) embedded in class files survived two kinds of attacks that attempt to erase watermarks: an obfuscactor attack, and a decompile-recompile attack.

UR - http://www.scopus.com/inward/record.url?scp=0034504466&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0034504466&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:0034504466

SP - 191

EP - 197

BT - Proceedings - IEEE Computer Society's International Computer Software and Applications Conference

PB - IEEE

ER -