期刊文献+

基于指令长度编码的PE软件水印 被引量:1

PE software watermarking encoded based on length of instructions
下载PDF
导出
摘要 根据PE文件中指令的信息冗余及PE文件的特点,提出了一种新的基于指令长度编码的PE软件水印方法。该方法使用SMC技术和指令的长度来编码水印,建立了水印和软件的依赖。实验结果表明,此方法能够以适中的性能代价来建立这种依赖并以此提高了水印抵抗多种攻击的能力。 According to the information redundance in the instructions and the characteristics of the PE file, a new PE software watermarking encoded based on length ofinstructions method is proposed. The advantage of this method is that a dependence relation between software and watermark is constructed by using the SMC technology and the length of instructions to encode watermark. Experimental result indicates that the resistance of the watermark to a variety of attacks is improved by constructing the dependence relation at modest cost.
作者 周萍 杨旭光
出处 《计算机工程与设计》 CSCD 北大核心 2008年第19期5119-5122,共4页 Computer Engineering and Design
关键词 PE文件格式 反汇编 自修改代码 软件水印 依赖 portable executable file format disassemble SMC software watermarking dependence
  • 相关文献

参考文献5

二级参考文献26

  • 1吴建军,高济.基于指令统计分布的软件水印方案[J].浙江大学学报(工学版),2005,39(2):225-228. 被引量:8
  • 2Business Software Alliance.First Annual BSA and IDC Global Software:Piracy Study[EB/OL].http://www.bsa.org/globalstudy/upload/Global-Software-Piracy-Study-English.pdf,2004-07.
  • 3R Davidson,N Myhrvold.Method and System for Generating and Auditing a Signature for a Computer Program[P].US Patent:5,559,884.1996.
  • 4J Stern,G Hachez,et al.Robust Object Watermarking:Application to Code[A].A Pfitzmann.Proceeding of Information Hiding'99[C].Dresden,Germany:Springer-Verlag,2000.368-378.
  • 5D Curran,N Hurley,M Cinneide.Securing Java Through Software Watermarking[C].Proceedings of the 2nd International Conference on Principles and Practice of Programming in Java,New York:Computer Science Press,2003.145-148.
  • 6J I Cox,J Kilian,et al.A Secure,Robust Watermark for Multimedia[A].Anderson.Proceedings of the 1st International Information Hiding Workshop[C].Berlin:Springer-Verlag,1996.185-206.
  • 7A Monden,H Iida,K Matsumoto,et al.A Practical Method for Watermarking Java Programs[C].Proceeding of the 24th Computer Software and Applications Conference (Compsac2000),Washington:IEEE Computer Society Press,2000.191-197.
  • 8C Collberg,C Thomborson.Watermarking,Tamper-proofing,and Obfuscation-tools for Software Protection[J].IEEE Transactions on Software Engineering,2002,28:735-746.
  • 9G Arboit.A Method for Watermarking Java Programs via Opaque Predicates[C].Proceeding of the 5th International Conference on Electronic Commerce Research(ICECR-5),Washington:IEEE Computer Society Press,2002.124-131.
  • 10C Collberg,E Carter,S Debray,et al.Dynamic Path-based Software Watermarking[C].Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation,New York:ACM Press,2004.107-118.

共引文献90

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部