DroidMark: A Lightweight Android Text and Space Watermark Scheme Based on Semantics of XML and DEX

Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 6)

Abstract

Android platform induces an open application development framework to attract more developers and promote larger market occupations at the same time. However, the open architecture also makes it easier to reverse engineering and application piracy. These result in the property loss for developers and companies, and increase the risks of mobile malicious code. Copyright protection for android application is thus of significant importance. Currently, many solutions for application copyright protection apply overload methods, assuming the availability of source code, which could be impractical for a large scale application protection. In this paper, we propose a lightweight copyright protection method for android application called DroidMark. The copyright is protected by text and space watermark based on semantics of xml and dex. Functional files are chosen as watermark carriers to increase watermark semi-fragileness and concealment. And the DroidMark can be accomplished without secret keys. Models and algorithms are proposed and analyzed all sidedly. The experiment results and analysis justified that DroidMark is secure and efficient.

Keywords

Binary Data Watermark Scheme Copyright Protection Malicious Code Scheme Construction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgements

The research was financially supported by the National Natural Science Foundation of China under Grant No.s 61310306028.

References

  1. 1.
    Sufatrio, Tan, D.J.J., Chua, T.-W., Thing, V.L.L.: Securing android: a survey, taxonomy, and challenges. ACM Comput. Surv. 47, 58–102 (2015)CrossRefGoogle Scholar
  2. 2.
    Choi, S., Jang, J., Jae, E.: Android applications copyright protection technology based on forensic mark. In: Proceedings of the 2012 ACM Research in Applied Computation Symposium (RACS 2012), pp. 338–339 (2012)Google Scholar
  3. 3.
    Kim, S.R., Kim, J.H., Kim, H.S.: A hybrid design of online execution class and encryption-based copyright protection for android apps. In: Proceedings of the 2012 ACM Research in Applied Computation Symposium (RACS 2012), pp. 342–343 (2012)Google Scholar
  4. 4.
    Atallah, M.J., McDonough, C., Nirenburg, S., Raskin, V.: Natural language processing for information assurance and security: an overview and implementations. In: Proceedings of the 2000 Workshop on New Security Paradigms (NSPW 2000), pp. 51–65 (2000)Google Scholar
  5. 5.
    Atallah, M.J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., Naik, S.: Natural language watermarking: design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 185–200. Springer, Heidelberg (2001). doi: 10.1007/3-540-45496-9_14 CrossRefGoogle Scholar
  6. 6.
    Meral, H.M., et al.: Natural language watermarking via morphosyntactic alterations. Comput. Speech Lang. 23, 107–125 (2009)CrossRefGoogle Scholar
  7. 7.
    Zhang, Y., Chen, K.: AppMark: a picture-based watermark for android apps. In: Eighth International Conference on Software Security and Reliability (SERE 2014), pp. 58–67 (2014)Google Scholar
  8. 8.
    Zhou, W., Zhang, X., Jiang, X.: AppInk: watermarking android apps for repackaging deterrence. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CCS 2013), pp. 1–12 (2013)Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.School of Computer ScienceChina University of GeosciencesWuhanChina
  2. 2.Information Security CenterBeijing University of Post and TelecommunicationsWuhanChina

Personalised recommendations