Conference Proceeding Article
We propose a novel dynamic software watermarking design based on Return-Oriented Programming (ROP). Our design formats watermarking code into well-crafted data arrangements that look like normal data but could be triggered to execute. Once triggered, the pre-constructed ROP execution will recover the hidden watermark message. The proposed ROP-based watermarking technique is more stealthy and resilient over existing techniques since the watermarking code is allocated dynamically into data region and therefore out of reach of attacks based on code analysis. Evaluations show that our design not only achieves satisfying stealth and resilience, but also causes significantly lower overhead to the watermarked program.
code obfuscation, return-oriented programming, reverse engineering, software watermarking
Computer Sciences | Information Security
ASIACCS'15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security: April 14-17, 2015, Singapore
City or Country
Ma, Haoyu; Lu, Kangjie; Ma, Xinjie; Zhang, Haining; Jia, Chunfu; and GAO, Debin.
Software Watermarking using Return-Oriented Programming. (2015). ASIACCS'15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security: April 14-17, 2015, Singapore. 369-380. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/2633
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.