期刊文献+

基于字节码的Java软件水印的研究与实现 被引量:2

Implementation of Software Watermarking Based on Bytecodes for Java Programs
下载PDF
导出
摘要 介绍了基于类文件字节码的Java软件水印技术.该技术通过修改操作数和编码操作码,把水印信息以二进制代码的形式嵌入到Java类文件的字节码中,从而对Java类文件进行有效保护.在Eclipse环境下实现了水印方案,完成了水印的嵌入和提取. This paper investigates the software watermarking technology for Java software watermarking based on bytecodes. By modifying the operands and encoding the opeodes, the watermark information is embedded into the bytecodes of Java class file in the form of binary codes such that the Java class file can be effectively protected. The watermarking scheme is implemented in the Eclipse environment, and the watermark information is embedded and extracted successfully.
出处 《微电子学与计算机》 CSCD 北大核心 2009年第9期146-149,152,共5页 Microelectronics & Computer
基金 江苏省高校自然科学基金(06KJD520152) 南通市应用研究计划(K20070013)
关键词 软件版权保护 软件水印 JAVA 类文件 字节码 software copyright protection software watermarking Java class file bytecode
  • 相关文献

参考文献5

  • 1张立和,杨义先,钮心忻,牛少彰.软件水印综述[J].软件学报,2003,14(2):268-277. 被引量:89
  • 2William Zhu, Clark Thomborson, Fei- Yue Wang. A survey of software watermarking. Intelligence and security informatics[ C]//IEEE International Conference on Intelligence and Security Informatics. Atlanta, USA, 2005:454 - 458.
  • 3Christian Collberg, Clark Thomborson. Software watermarking: models and dynamic embeddings[ C]//Principles of Programming Languages. Auckland, 1999 : 311 - 324.
  • 4Akito Moden, Hajimu Iida, Ken- ichi Matsumoto, et al. A practical method for watermarking java programs[ C]// The 24th Computer Software and Applications Conference. Taiwan, Taipei, 2000.
  • 5鲍福良,彭俊艳,方志刚.Java类文件保护方法综述[J].计算机系统应用,2007,16(6):124-126. 被引量:5

二级参考文献13

  • 1张敦华,刘建.Java动态类加载机制及其应用[J].计算机工程与设计,2004,25(3):432-435. 被引量:18
  • 2陈刚.基于封装包的Java源代码安全保护[J].电子信息对抗技术,2006,21(3):45-48. 被引量:2
  • 3Bacon,David F,Susan L.Compiler Transformations for High-Performance Computing[J].ACM Computing Surveys.1994,26 (4):345 -420.
  • 4Behrens B,Levary R.Practical Legal Aspects of Software Reverse Engineering[J].Communications of the ACM.1998,41(2):27 -29.
  • 5Cifuentes,Cristina,K.John Gough.Decompilation of Binary Programs[J].Software-Practice and Experience.1995,25(7):811 -829.
  • 6Chan Jien-Tsai,Yang Wu.Advanced Obfuscation Techniques for Java Bytecode[J].Journal of Systems and Software Volume.2004,71(1):1 -10.
  • 7Berghei H.Wartermarking Cyberspace[J].Communications of the ACM.1997,40(11):19 -24.
  • 8Ichisugi Y.Watermark for Software and its Insertion,Attacking,Evaluation and Implementation Methods[A].Summer Symposium on Programming,IPSJ[C].1997:57-64.
  • 9Hanpeter van Vliet.Mocha,the Java Decompiler[EB/OL].http://www.brouhaha.com/- eric/software/mocha/.
  • 10Martyn Honeyford.Weighing in on Java native compilation[EB/OL].http://www-900.ibm.com/developerworks/cn/java/j-native/index.shtml.

共引文献91

同被引文献8

  • 1鲍福良,彭俊艳,方志刚.Java类文件保护方法综述[J].计算机系统应用,2007,16(6):124-126. 被引量:5
  • 2樊昌信,曹丽娜.通信原理[M].北京:国防工业出版社,2010.
  • 3Collberg C, Thomborson C. Watermarking, tamper-proofing, and Obfuscation--Tools for Software Proteetion[J]. IEEE Transac- tions on Software Engineering, 2002,28(8) : 735-746.
  • 4Zhu W, Thomborson C, Wang F. A Survey of Software Water- marking[C] IEEE International Conference on Intelligence and Security Informaties. 2005 : 454-458.
  • 5Hamilton J ,Danicic S. A survey of static software watermarking [C]IEEE World Congress on Internet Security. 2011 : 100-107.
  • 6Monden A, Iida H, Matsumoto K, et al. A Practical Method for Watermarking Java Programs [C]//The 24th International Computer Software and Applications Conference. 2000:191-197.
  • 7周正虎,陈丹,周光霞,赵鑫.基于病毒多态性的Java软件水印技术[J].计算机与数字工程,2011,39(11):97-100. 被引量:2
  • 8张立和,杨义先,钮心忻,牛少彰.软件水印综述[J].软件学报,2003,14(2):268-277. 被引量:89

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部