Evaluating Security of Executable Steganography for Digital Software Watermarking

被引:2
|
作者
Mullins, J. Alex [1 ]
McDonald, J. Todd [1 ]
Mahoney, William R. [2 ]
Andel, Todd R. [1 ]
机构
[1] Univ S Alabama, Sch Comp, Mobile, AL 36688 USA
[2] Univ Nebraska, Sch Comp, Omaha, NE 68182 USA
来源
基金
美国国家科学基金会;
关键词
software watermarking; obfuscation; IP protection; steganography;
D O I
10.1109/SoutheastCon48659.2022.9763988
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Man-at-the-end (MATE) attacks against software programs are difficult to protect. Adversaries have complete access to the binary program and can run it under both static and dynamic analysis to find and break any software protection mechanisms put in place. Even though full-proof protection is not possible practically or theoretically, the goal of software protection should be to make it more difficult for an adversary to find program secrets by increasing either their monetary cost or time. Protection mechanisms must be easy to integrate into the software development lifecycle, or else they are of little to no use. In this paper, we evaluate the practical security of a watermarking technique known as Weaver, which is intended to support software watermarking based on a new transformation technique called executable steganography. Weaver allows hiding of identification marks directly into a program binary in a way that makes it difficult for an adversary to find and remove. We performed instruction frequency analysis on 106 programs from the GNU coreutils package to understand and define Weaver's limitations and strengths as a watermarking technique. Our evaluation revealed that the initial prototype version of Weaver suffers from limitations in terms of standard benchmarks for steganography evaluation, such as its stealth. We found that this initial prototype of Weaver relied heavily on one type of instruction that does not frequently occur in standard programs, namely the mov instruction with an 8-byte immediate operand. Our instruction frequency analysis revealed a negative impact due to Weaver's over-reliance on this mov instruction.
引用
收藏
页码:666 / 673
页数:8
相关论文
共 50 条
  • [21] Electrocardiogram signal security by digital watermarking
    Khaldi A.
    Kafi M.R.
    Meghni B.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (10) : 13901 - 13913
  • [22] Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography
    Wang, Zihan
    Byrnes, Olivia
    Wang, Hu
    Sun, Ruoxi
    Ma, Congbo
    Chen, Huaming
    Wu, Qi
    Xue, Minhui
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (06) : 2985 - 2999
  • [23] Digital watermarking techniques for image security: a review
    A. Mohanarathinam
    S. Kamalraj
    G. K. D. Prasanna Venkatesan
    Renjith V. Ravi
    C. S. Manikandababu
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 3221 - 3229
  • [24] Digital Watermarking of High Security Based on Holography
    Han, Chao
    Li, Mengmeng
    Wu, Wei
    [J]. MEASUREMENT TECHNOLOGY AND ENGINEERING RESEARCHES IN INDUSTRY, PTS 1-3, 2013, 333-335 : 1051 - 1055
  • [25] Guest Editorial: Digital Watermarking and Multimedia Security
    Jeng-Shyang Pan
    Peng Shi
    [J]. Circuits, Systems & Signal Processing, 2008, 27 : 133 - 136
  • [26] On the security of a fragile digital image watermarking scheme
    Sang, Jun
    Alam, Mohammad S.
    Zhu, Xiaohong
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON GRAPHICS AND VISUALIZATION IN ENGINEERING, 2007, : 53 - +
  • [27] Digital image watermarking in power system security
    Xie Ping
    Wang Xin
    Wang Ying
    Liu Jiehui
    [J]. PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 461 - 463
  • [28] Guest editorial: Digital watermarking and multimedia security
    Pan, Jeng-Shyang
    Shi, Peng
    [J]. CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2008, 27 (02) : 133 - 136
  • [29] Digital watermarking techniques for image security: a review
    Mohanarathinam, A.
    Kamalraj, S.
    Prasanna Venkatesan, G. K. D.
    Ravi, Renjith V.
    Manikandababu, C. S.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (08) : 3221 - 3229
  • [30] PROVIDING NETWORK SECURITY BY USING THE STEGANOGRAPHY ON DIGITAL IMAGES
    Ergun, Fulden
    Kirsal Ever, Yoney
    [J]. 2018 2ND INTERNATIONAL SYMPOSIUM ON MULTIDISCIPLINARY STUDIES AND INNOVATIVE TECHNOLOGIES (ISMSIT), 2018, : 360 - 364