Fig. 1. Kim-gisa and T-map copyright dispute[5]
Fig. 2. Cymera and Analog Filter copyright dispute[7]
Fig. 4. Example of the method overloading
Fig. 5. Example before method overloading
Fig. 6. Example after method overloading
Fig. 7. Example of the method overriding
Fig. 8. Example before method overriding
Fig. 9. Example after method overriding
Fig. 10. Method overloading example before adding opaque predicate
Fig. 11. Method overloading example after adding opaque predicates
Fig. 12. Method overriding example before adding opaque predicate
Fig. 13. Method overriding example after adding opaque predicates
Fig. 14. Structure of watermarking system
Fig. 15. Changes of source and apk file size according to method overloading numbers
Fig. 16. Changes of source and apk file size according to method overriding numbers
Fig. 17. Runtime overheads according to opaque predicate numbers
Fig. 3. (a) Original source and (b) Modified source with copyright information
Table 1. Example of opaque predicates
Table 2. Changes of source and apk file size according to method overloading numbers
Table 3. Changes of source and apk file size according to method overriding numbers
Table 4. Runtime overheads according to opaque predicate numbers
References
- Asia economy. (2017). Share of adults who own smartphones by country in 2018. http://www.asiae.co.kr/news/view.htm?idxno=2017101707023014904.
- Money week. (2016). Smartphone holding rate in Korea. http://www.moneyweek.co.kr/news/mwView.php?no=2016022408518055090.
- Joins economy. (2017). Piracy of smartphone application. https://news.joins.com/article/21799946.
- Keyeslabs. (2018). A Global Piracy Heat Map. http://keyeslabs.com/joomla/projects/auto-app-licensing/152-a-global-piracy-heat-map.
- Kinews. (2015). Kim Gisa and T-map copyright dispute. http://www.ittoday.co.kr/news/articleView.html?idxno=66263.
- CNB news. (2015). The watermark of T-map. http://www.cnbnews.com/news/article.html?no=309110.
- Financial news. (2016). Cymera and Analog Filter copyright dispute. http://www.fnnews.com/news/201605091205212639.
- Huffington post. (2016). SK Communications 'Cyamera' and 'Analog Filter' copyright dispute. https://www.huffingtonpost.kr/2016/05/11/story_n_9903264.html.
- D. Kim, H. Jang & S. Cho. (2009). Low-level Language based Static Watermarking for Intellectual Property Protection of Mobile Software, Proc. of KIISE, 36(1-D), 55-60.
- C. Jun, J. Jung, B. Kim, J. Jang, Y. Cho & J. Hong. (2011). A new approach to software watermarking based on calling convention, Proc. of KIISE, 38(2-C), 156-159.
- S. A. Moskowitz & M. Cooperman. (1998). Method for stega-cipher protection of computer code, United States Patent 5745569A.
- C. Collberg, E. Carter, S. Debray, A. Huntwork, J. Kececioglu, C. Linn & M. Stepp. (2004). Dynamic Path-Based Software Watermaking, Proc. of ACM SIGPLAN Conf. on PLDI. 107-118.
- Y. Wang, D. Gong, B. Lu, F. Xiang & F. Liu.. (2018). Exception Handling-Based Dynamic Software Watermarking. Proc. of IEEE Access 6, 8882-8889.
- Korea copyright commission. (2010). Codejam service. http://www.ddaily.co.kr/news/article.html?no=72525.
- H. Park. (2018). Java Class Watermarking Technique based on Object-Oriented Characteristics, Proc. of 12th KIISE and KBS Symp, 132-135.
- K. Arnold, J. Gosling & D. Holmes. (2005). The Java Programming Language, Fourth Edition. Addison Wesley Professional.
- C. Collberg, C. Thomborson & Douglas Low. (1998). Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. Proc. of 25th ACM IGPLAN-SIGACT Symp. on POPL, 184-196.
- J. Ming, D. Xu, L. Wang & D. Wu. (2015). LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code. Proc. of 22nd ACM SIGSAC Conf. on CCS, 757-768.
- G. Myles & C. Collberg. (2006). Software watermarking via opaque predicates: Implementation, analysis, and attacks. Electron Commerce Research, 6(2-2), 155-171. https://doi.org/10.1007/s10660-006-6955-z
- Android Open Source Sample Project. (2014). Jet Boy, https://github.com/Miserlou/Android-SDK-Samples/tree/master/JetBoy.