Software watermarking using Return-Oriented Programming

Haoyu Ma, Kangjie Lu, Xinjie Ma, Haining Zhang, Chunfu Jia, Debin Gao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

Abstract

We propose a novel dynamic software watermarking design based on Return-Oriented Programming (ROP). Our design formats watermarking code into well-crafted data arrangements that look like normal data but could be triggered to execute. Once triggered, the pre-constructed ROP execution will recover the hidden watermark message. The proposed ROP-based watermarking technique is more stealthy and resilient over existing techniques since the watermarking code is allocated dynamically into data region and therefore out of reach of attacks based on code analysis. Evaluations show that our design not only achieves satisfying stealth and resilience, but also causes significantly lower overhead to the watermarked program.

Original languageEnglish (US)
Title of host publicationASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages369-380
Number of pages12
ISBN (Electronic)9781450332453
DOIs
StatePublished - Apr 14 2015
Event10th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2015 - Singapore, Singapore
Duration: Apr 14 2015Apr 17 2015

Publication series

NameASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security

Other

Other10th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2015
Country/TerritorySingapore
CitySingapore
Period4/14/154/17/15

Bibliographical note

Publisher Copyright:
Copyright © 2015 ACM.

Keywords

  • Code obfuscation
  • Return-oriented programming
  • Reverse engineering
  • Software watermarking

Fingerprint

Dive into the research topics of 'Software watermarking using Return-Oriented Programming'. Together they form a unique fingerprint.

Cite this