Evaluating Security of Executable Steganography for Digital Software Watermarking

被引:2
|
作者
Mullins, J. Alex [1 ]
McDonald, J. Todd [1 ]
Mahoney, William R. [2 ]
Andel, Todd R. [1 ]
机构
[1] Univ S Alabama, Sch Comp, Mobile, AL 36688 USA
[2] Univ Nebraska, Sch Comp, Omaha, NE 68182 USA
来源
基金
美国国家科学基金会;
关键词
software watermarking; obfuscation; IP protection; steganography;
D O I
10.1109/SoutheastCon48659.2022.9763988
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Man-at-the-end (MATE) attacks against software programs are difficult to protect. Adversaries have complete access to the binary program and can run it under both static and dynamic analysis to find and break any software protection mechanisms put in place. Even though full-proof protection is not possible practically or theoretically, the goal of software protection should be to make it more difficult for an adversary to find program secrets by increasing either their monetary cost or time. Protection mechanisms must be easy to integrate into the software development lifecycle, or else they are of little to no use. In this paper, we evaluate the practical security of a watermarking technique known as Weaver, which is intended to support software watermarking based on a new transformation technique called executable steganography. Weaver allows hiding of identification marks directly into a program binary in a way that makes it difficult for an adversary to find and remove. We performed instruction frequency analysis on 106 programs from the GNU coreutils package to understand and define Weaver's limitations and strengths as a watermarking technique. Our evaluation revealed that the initial prototype version of Weaver suffers from limitations in terms of standard benchmarks for steganography evaluation, such as its stealth. We found that this initial prototype of Weaver relied heavily on one type of instruction that does not frequently occur in standard programs, namely the mov instruction with an 8-byte immediate operand. Our instruction frequency analysis revealed a negative impact due to Weaver's over-reliance on this mov instruction.
引用
收藏
页码:666 / 673
页数:8
相关论文
共 50 条
  • [31] Performance Analysis of LSB, DCT, and DWT for Digital Watermarking Application using Steganography
    Chandran, Saravanan
    Bhattacharyya, Koushik
    [J]. 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [32] A Clairvoyant Approach to Evaluating Software (In)Security
    Jain, Bhushan
    Tsai, Chia-Che
    Porter, Donald E.
    [J]. PROCEEDINGS OF THE 16TH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS (HOTOS 2017), 2017, : 62 - 68
  • [33] Research on Digital Watermarking Agent Based on Software Behavior
    Wen, Quan
    Wang, Yufei
    [J]. MECHANICAL ENGINEERING AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2012, 195-196 : 589 - +
  • [34] Digital Audio Watermarking Techniques for the security of VOIP Communications
    Er, Fusun C.
    Gul, Ensar
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (03): : 147 - 155
  • [35] New VoIP traffic security scheme with digital watermarking
    Mazurczyk, Wojciech
    Kotulski, Zbigniew
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2006, 4166 : 170 - 181
  • [36] The Digital Watermarking Used to the Smart Power Grid Security
    Yan, Xin
    Du, Jiagen
    Li, Junru
    [J]. ADVANCED MATERIALS SCIENCE AND TECHNOLOGY, PTS 1-2, 2011, 181-182 : 770 - +
  • [37] Digital Watermarking Technology and Its Application in Information Security
    Liu, Shan
    Yue, Keming
    Yang, Hua
    Liu, Lu
    Duan, Xiaorong
    Guo, Ting
    [J]. 2017 IEEE 3RD INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC), 2017, : 786 - 789
  • [38] A Dynamic Security Model for Visual Cryptography and Digital Watermarking
    Chitra, K.
    Venkatesan, V. Prasanna
    [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 351 - 357
  • [39] Study of Digital Watermarking Techniques for Against Security Attacks
    Maloo, Snehlata
    Lakshmi, N.
    Pareek, N. K.
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 1, 2018, 83 : 509 - 515
  • [40] Digital Watermarking Security in the Printing and Scanning Process of Image
    Chen, Hai-sheng
    [J]. DIGITAL FABRICATION 2011/ NIP27- 27TH INTERNATIONAL CONFERENCE ON DIGITAL PRINTING TECHNOLOGIES: TECHNICAL PROGRAMS AND PROCEEDINGS, 2011, 2011, : 263 - 266