Evaluating Security of Executable Steganography for Digital Software Watermarking

被引:2
|
作者
Mullins, J. Alex [1 ]
McDonald, J. Todd [1 ]
Mahoney, William R. [2 ]
Andel, Todd R. [1 ]
机构
[1] Univ S Alabama, Sch Comp, Mobile, AL 36688 USA
[2] Univ Nebraska, Sch Comp, Omaha, NE 68182 USA
来源
基金
美国国家科学基金会;
关键词
software watermarking; obfuscation; IP protection; steganography;
D O I
10.1109/SoutheastCon48659.2022.9763988
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Man-at-the-end (MATE) attacks against software programs are difficult to protect. Adversaries have complete access to the binary program and can run it under both static and dynamic analysis to find and break any software protection mechanisms put in place. Even though full-proof protection is not possible practically or theoretically, the goal of software protection should be to make it more difficult for an adversary to find program secrets by increasing either their monetary cost or time. Protection mechanisms must be easy to integrate into the software development lifecycle, or else they are of little to no use. In this paper, we evaluate the practical security of a watermarking technique known as Weaver, which is intended to support software watermarking based on a new transformation technique called executable steganography. Weaver allows hiding of identification marks directly into a program binary in a way that makes it difficult for an adversary to find and remove. We performed instruction frequency analysis on 106 programs from the GNU coreutils package to understand and define Weaver's limitations and strengths as a watermarking technique. Our evaluation revealed that the initial prototype version of Weaver suffers from limitations in terms of standard benchmarks for steganography evaluation, such as its stealth. We found that this initial prototype of Weaver relied heavily on one type of instruction that does not frequently occur in standard programs, namely the mov instruction with an 8-byte immediate operand. Our instruction frequency analysis revealed a negative impact due to Weaver's over-reliance on this mov instruction.
引用
收藏
页码:666 / 673
页数:8
相关论文
共 50 条
  • [1] Special section on security, steganography, and watermarking
    Dittmann, Jana
    Delp, Edward J.
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)
  • [2] Digital Watermarking Security
    Blake, Jonathan
    Latifi, Shahram
    [J]. DEFENCE SCIENCE JOURNAL, 2011, 61 (05) : 408 - 414
  • [3] A STUDY OF INFLUENCE BETWEEN DIGITAL WATERMARKING AND STEGANOGRAPHY
    Zhou, Yafeng
    Ng, Wing W. Y.
    [J]. 2013 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION (ICWAPR), 2013, : 49 - 55
  • [4] Security Scheme for Digital Watermarking
    Xiao Jun
    Wang Ying
    Li Dengyu
    Zhang Ying
    Zhu Li
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 335 - 339
  • [5] A secure transaction model based on digital steganography and watermarking
    Yin, KK
    Pan, ZG
    Xiang, H
    Shi, JY
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN & COMPUTER GRAPHICS, 1999, : 1314 - 1318
  • [6] Data Hiding and Its Applications: Digital Watermarking and Steganography
    Megias, David
    Mazurczyk, Wojciech
    Kuribayashi, Minoru
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (22):
  • [7] Digital watermarking and steganography via overlays of halftone images
    Wu, CW
    Thompson, G
    Stanich, M
    [J]. MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION VII, WITH APPLICATIONS, 2004, 5561 : 152 - 163
  • [8] Security models of digital watermarking
    Li, Qiming
    Memon, Nasir
    [J]. MULTIMEDIA CONTENT ANALYSIS AND MINING, PROCEEDINGS, 2007, 4577 : 60 - +
  • [9] Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions
    Evsutin, Oleg
    Melman, Anna
    Meshcheryakov, Roman
    [J]. IEEE ACCESS, 2020, 8 : 166589 - 166611
  • [10] Digital Audio Watermarking and Image Watermarking for Information Security
    Warkar, Rupali
    More, Priyanka
    Waghole, Dattatray
    [J]. 2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,