Abstract
We propose a novel dynamic software watermarking design based on Return-Oriented Programming (ROP). Our design formats watermarking code into well-crafted data arrangements that look like normal data but could be triggered to execute. Once triggered, the pre-constructed ROP execution will recover the hidden watermark message. The proposed ROP-based watermarking technique is more stealthy and resilient over existing techniques since the watermarking code is allocated dynamically into data region and therefore out of reach of attacks based on code analysis. Evaluations show that our design not only achieves satisfying stealth and resilience, but also causes significantly lower overhead to the watermarked program.
Original language | English (US) |
---|---|
Title of host publication | ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security |
Publisher | Association for Computing Machinery |
Pages | 369-380 |
Number of pages | 12 |
ISBN (Electronic) | 9781450332453 |
DOIs | |
State | Published - Apr 14 2015 |
Event | 10th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2015 - Singapore, Singapore Duration: Apr 14 2015 → Apr 17 2015 |
Publication series
Name | ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security |
---|
Other
Other | 10th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2015 |
---|---|
Country/Territory | Singapore |
City | Singapore |
Period | 4/14/15 → 4/17/15 |
Bibliographical note
Publisher Copyright:Copyright © 2015 ACM.
Keywords
- Code obfuscation
- Return-oriented programming
- Reverse engineering
- Software watermarking